Skip to main content
Category

Cyber Attacks

Radisson Hotel Group Suffered Data Breach Affecting Rewards Members

Evolve MGA Cyber Insurance

The Radisson Hotel Group has suffered a data breach that resulted in the theft of data for its Radisson Rewards global loyalty program in September, but didn’t realize it until October 1st, allowing the hackers to infiltrate and expose critical information. Considering the Radisson Hotel Group has an abundance of hotels, some 1,400 across 70 countries, analysts and customers wonder how severe this data breach was, but according to the hotel chain, the hackers were only able to affect merely 10% of their customers and did not compromise any credit card information or passwords.

When asked to quantify the affects of the breach, Radisson officials declined to mention how many customers were actually exposed nor would they confirm the geographical locations impacted the most. However, according to Data Breach Today, since May 25, under GDPR, all organizations that suffer a serious breach involving Europeans’ personal data must report the breach to relevant authorities within 72 hours of becoming aware of it. Failure to do so, as well as more general information security shortcomings, can expose an organization to steep fines.

The Radisson did release the information that was exposed, which is worth noting:

  • Member name
  • Address, including country of residence
  • Email address
  • Company name (in some cases)
  • Phone number (in some cases)
  • Radisson Rewards member number (in some cases)
  • Any frequent flyer numbers on file (in some cases)

EvolveMGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

If you’d like to read more about the Radisson’s data breach, click here.

The Kraken, Ransomware-as-a-Service, Makes It Easy To Deploy Malware

Evolve MGA Cyber Insurance

Ransomware-as-a-service surfaced earlier this year as it was found that purchasing malware to deploy on targets was an increasingly more viable option as it was cheaper and required less skill. With ransomware now an item that is easily accessible, the ability for programmers to now create super viruses became a powerful opportunity. With that being said, analysts at McAfee found the Kraken. This malware uses an exploit kit to help it score fresh victims, and unfortunately, that combination may prove challenging to defend against.

The Kraken first surfaced this summer on a top Russian language forum and is now being licensed out by an individual who goes by the name, “ThisWasKraken”. The virus has proven to be effective as it typically gets past anti-virus software without detection. As it’s the developer’s goal to get more wannabe hackers to purchase and deploy the virus on fresh victims, the primary target for Kraken is computers running Windows 8, 8.1 and 10 but Kraken can quickly encrypt all files without regard for the size of any file, according to analysts.

EvolveMGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

If you’d like to read more about the destructive abilities of the Kraken, click here.

Cathay Pacific Airlines Data Breach Affects 9.4 Million Passengers

Evolve MGA Cyber Insurance

Hong Kong’s Cathay Pacific airlines recently experienced a data breach that allowed a hacker unauthorized access of personal data to 9.4 million passengers. According to cyber experts who are working closely with this incident report that the details provided by Cathay Pacific think the magnitude of the attack might be in result of the company shifting from legacy systems to cloud based systems.

In the process of transitioning to the cloud, the airlines company decided to cut some senior IT executives which analysts believe could have affected the outcome of some of the security protocols needed to ensure the front end customer facing apps were installed correctly. They suggest there could have been poor programming as well as lack of security patch installed in a timely manner. With most of airlines becoming more cloud and internet based (i.e. internet in-flight entertainment), security experts strongly suggest that airlines need to ramp up their security protocols as they have a greater chance of getting hacked.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

If you’d like to read more about the data breach involving Cathay Pacific airlines, click here.

If your client is using a VoIP phone system, they are a HUGE target for hackers

Evolve | Credit Card Data Breach

If your client is using a VoIP phone system, they are a HUGE target for hackers?

It’s incredibly hard to defend your system against employees clicking on phishing links that they shouldn’t be clicking on. Contact us to get a quality cyber policy for your clients.

How Does Telephone Hacking Occur?

Because VoIP sends calls directly through the same exact path that your network uses for internet and other traffic, your VoIP connections open your network to attack and exploitation. Hackers can sign up to lease premium-rate phone numbers (often used for sexual-chat or psychic lines), from web-based services that charge dialers over $1 a minute and give the lessee a cut. This type of attack is referred to as “Toll Fraud” but other common phone attacks include DDoS and Eavesdropping.
 
Claims Example: Architecture Firm
An Architecture Firm in Norcross, GA ran up a $166,000 phone bill in a single weekend. Hackers routed calls from the firm to premium-rate telephone numbers in Gambia, Somalia and the Maldives. High speed computers allowed the hackers to make hundreds of calls simultaneously. The local police said there had been no progress in finding the hackers. The firm had no idea that this was a potential risk factor could seriously threaten the health of the business.
 
How Can I Make Sure My Client is Covered?
First ensure that your client has a cyber policy in place that includes first party crime coverage. Because this is unique type of hacking attack, you want to make sure that it is specifically listed in the policy wording. Many times it is referenced as “telephone hacking.” If you are looking to ensure that your client has quality coverage in place in the event of a telephone hacking attack, please contact Patrick Costello (contact info above) or click the quote button below.
 
 

Voter Registration Records From 20 States Found on the Dark Web

Evolve MGA Cyber Insurance

A group of voter registration records from 20 states appeared for sale online this week after two cyber security firms found an advertisement for the voter information on a data trading forum. Anomali Labs was able to test a sample size of the voter data and confirmed that the information in fact valid. Although this breach of voter registration records is not the largest we’ve seen, it’s worth noting that all 50 states allow political parties and candidates to have access to the records, which in turn creates an innumerable amount of potential vulnerabilities.

With the 2018 Midterm elections quickly approaching in November, the need for proper cyber security protocols to be in place to protect the identities and sensitive data of our voters is paramount. The influence that cybercriminals had on the 2016 presidential election had tremendous affect on voter moral and if not taken seriously, cybercriminals can ultimately affect important elections and bills being passed moving forward.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

3rd Party Agency at the Pentagon Suffered a Catastrophic Data Breach

Evolve MGA Cyber Insurance

The Pentagon (US department of Defense) released a warning that a third party travel management vendor experienced a data breach that can potentially expose 30,000 military and civilian personnel. According to the DoD, those affected by the cyber attack were notified that their personally identifiable information and payment card information could be compromised and that they are offering victims prepaid identity theft monitoring services.

The General Accountability Office (GAO) didn’t seem too surprised of the attack as cybersecurity tends to be an afterthought to US weapon developers. In fact, according to the GAO, the penetration tested conducted displayed that the weapons can be subverted. “Using relatively simple tools and techniques, testers were able to take control of systems and largely operate undetected, due in part to basic issues such as poor password management and unencrypted communications” GAO says.

Government agencies, municipalities, and healthcare organizations typically get targeted the most due to outdated systems, unaware employees, and lack of cyber security tools being in place. In the eyes of a cybercriminal, these victims are low hanging fruit and a potentially lucrative payday.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

If you’d like to read more about the third party data breach at the Pentagon, click here.

Doomsday Scenario Can Play Out If HealthCare Industry Isn’t Proactive

Evolve MGA Cyber Insurance

Chief Information Security Officer (CISO) at University of Chicago Medicine, Erik Decker, believes that if major cyber risks are not mitigated then it is likely that an attack can devastate regional healthcare systems. According to Erik, a terrorism is main concern, stating that “if a threat actor can get to a certain level of sophistication and understand how to compromise regional health systems – independent health systems that are not part of the same group – by leveraging a lot of the same types of vendors that we all use and the access that these third parties have then you have a situation that is going to be quite catastrophic.”

As we continue to see the healthcare industry at the center of cyber attacks, it becomes more apparent how much these institutions are low hanging fruit for cybercriminals. Decker is co-leading a Department of Health and Human Services task group of more than 150 industry experts that is devising a plan for implementing certain provisions of the Cybersecurity Information Sharing Act of 2015 within the healthcare sector.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

If you’d like to read more about preventing a Doomsday scenario, click here.

The City of Houston Purchased a $30M Cyber Insurance Policy

Evolve | Travis - Did You Know

It is incredibly difficult to defend your system against employees clicking on phishing links that they shouldn’t be clicking on. Contact us today to get a quality cyber policy for your clients.

Why Did the City of Houston Purchase Cyber Insurance?

David Robinson, chairman of the city council’s Transportation, Technology, and Infrastructure committee, convinced the city council to purchase a $30,000,000 policy. He proactively pushed this initiative to protect the city’s infrastructure against the enormous costs of a data breach.
 
Claims Example: City of Atlanta
On March 22nd, 2018, the city of Atlanta was hit with a ransomware attack, which left much of the city departments paralyzed as their data and applications were encrypted by the SamSam malware that was deployed by the cybercriminals. After choosing not to pay the $52,000 ransom, the hacker took the demand portal offline and forced the city to fend for itself. That small ransom eventually turned into $2,000,000+ in expenditures in order to get the city up and running. The attack took down or disabled more than a third of Atlanta’s 424 necessary programs and close to 30 percent of their affected apps were listed as “mission critical.” The police lost all of their dash cam recordings. Additionally, the City Attorney’s office lost 10 years worth of documents and all but six of its 77 computers.
 
How Can I Make Sure My Client is Covered?
City governments are huge targets for cyber-attacks. They hold tons of sensitive information, they have significant power within the community, and they may employ controversial political figures. Many times they are viewed as “low hanging fruit” because their systems, cyber security tools and tech processes are outdated. It is imperative that cities, municipalities, and public entities have quality cyber policies in place. This means cyber policies that include coverage for system damage, business interruption, and cyber-crime.
 
 

Know Your State’s Laws: Breach Notification Law Interactive Map

Evolve | Breach Notification Law Interactive Map

Baker Law produced an interactive map highlighting each of the state’s breach notification laws. As a responsible business owner, it is important that you notify all affected parties in an efficient and timely manner. This ensures that you are able to avoid reputational harm.

If you’re an insurance broker, familiarizing yourself with Baker Law’s interactive map can help with explaining to your clients the importance of having a cyber insurance policy in place.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!

Click here to access Baker Law’s nationwide interactive map.

Facebook’s Single Sign On (SSO) Hacked – 50M Accounts Exploited!

Evolve MGA Cyber Insurance

This week, Facebook’s Single Sign-On (SSO) feature was hacked, resulting in 50 million accounts being exploited. In case you were wondering, SSO is an authentication process that allows a user to access multiple web applications with one set of login credentials. So not only is it supposed to be a productivity hack but it’s also supposed to be a level of security (so you don’t have passwords lying around on sticky notes). Facebook uses SSO and access tokens to allow users to stay logged into Facebook without having to re-enter passwords any time users comes back. Additionally, when users access other web applications that have integrations with Facebook, users can easily log into those accounts as well using the digital keys that Facebook has programmed. Although the ease of use has major upside for users who are consistently accessing these apps on a daily basis, the risk of getting hacked then allows cybercriminals to potentially access all of the users accounts.

Evolve MGA offers cyber insurance that covers policyholders in the event their cloud data is hacked, lost, or stolen. Get appointed with our cyber insurance specialists for a FREE Quote!