Tennessee-based mortgage lender confirms December cyberattack

Avatar

One of the largest mortgage lenders in the Southeast U.S. said it suffered a cybersecurity incident last month that exposed troves of customer information. 

Tennessee-based Mortgage Investors Group (MIG) did not outline how many customers were impacted by the attack but said they have hired a vendor to identify the affected individuals. The company said it expects to notify those customers directly once the process is completed in several weeks. 

MIG posted a notice to its website explaining that a cyberattack affecting its network infrastructure began on December 11 and was discovered one day later. 

“The investigation revealed that an unauthorized user had gained access to MIG’s computer environment. This unauthorized access resulted in the exposure of sensitive personal information pertaining to a number of individuals,” the company said. MIG has more than 26 branches and about 300,000 customers — securing over $30 billion in closed loans since its founding in 1989. 

MIG warned that those affected likely had their full names and financial information exposed during the cyberattack. The company did not respond to requests for comment about whether the incident was a ransomware attack. 

The attack was claimed over the weekend by the Black Basta ransomware gang — one of the most notorious hacking groups currently operating. 

After the gang attacked a large nonprofit hospital network in the U.S., federal law enforcement agencies warned that the group was targeting 12 of the 16 critical infrastructure sectors and attacked at least 500 organizations globally between April 2022 and May 2024.

Black Basta has previously taken credit for attacks on Dish Network, the American Dental Association and the government of Chile

Ransomware gangs have repeatedly targeted financial institutions involved in the housing industry, holding several large companies hostage in recent years. 

Housing purchases were stymied at points over the last two years after recent ransomware attacks on lenders and title insurance firms like Mr. Cooper, LoanDepot, Fidelity National Financial, Nations Direct Mortgage and First American.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Russia’s largest platform for state procurement hit by cyberattack from pro-Ukraine group

Next Post

Connecticut city of West Haven assessing impact of cyberattack

Related Posts

WhatsApp Adds Advanced Chat Privacy to Blocks Chat Exports and Auto-Downloads

WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block participants from sharing the contents of a conversation in traditional chats and groups. "This new setting available in both chats and groups helps prevent others from taking content outside of WhatsApp for when you may want extra privacy," WhatsApp said in a statement. The optional feature
Avatar
Read More

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. The packages
Avatar
Read More

FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux

Threat hunters have shed light on a new campaign targeting the foreign ministry of an unnamed South American nation with bespoke malware capable of granting remote access to infected hosts. The activity, detected in November 2024, has been attributed by Elastic Security Labs to a threat cluster it tracks as REF7707. Some of the other targets include a telecommunications entity and a university,
Avatar
Read More