wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/19\/nationsbenefits-confirms-thousands-had-personal-data-stolen-in-fortra-breach\/<\/a><\/br> Another corporate giant has confirmed thousands of healthcare members had information stolen in the cyberattack targeting Fortra customers.<\/p>\n Florida-based technology company NationsBenefits said in a data breach notice<\/a> filed with New Hampshire\u2019s attorney general that more than 7,100 state residents had their personal information stolen in the late-January ransomware attack on Fortra\u2019s systems.<\/p>\n NationsBenefits provides supplemental benefits for health insurance members, such as vision, hearing and over-the-counter drugs.<\/p>\n The data breach notice said hackers stole personal information of NationsBenefits members stored in its Fortra-hosted instance of GoAnywhere, a file transfer software tool used by thousands of organizations to share large sets of data over the internet.<\/p>\n Hackers used a previously unknown vulnerability to raid dozens of customer GoAnywhere instances hosted by Fortra in the January mass-hack. The Clop ransomware gang claimed<\/a> responsibility, alleging it stole data on more than\u00a0a hundred organizations.<\/p>\n NationsBenefits did not say in its data breach notice what specific members\u2019 personal information was stolen in the attack.<\/p>\n When reached by TechCrunch, NationsBenefits spokesperson Michael Fried declined to say what specific members\u2019 data was stolen in the incident, adding that the company is \u201ccomplying with all legal and commercial obligations in response to this incident.\u201d<\/p>\n It\u2019s not known how many individuals residing outside of New Hampshire are affected. NationsBenefits also filed a data breach notice in California, but companies are not obligated under the state\u2019s law to disclose how many residents are affected by a data breach. Companies typically have to disclose data breaches in California when 500 residents or more are affected.<\/p>\n NationsBenefits has more than 20 million members across the United States. The company\u2019s spokesperson declined to say how many of its millions of members are affected by the breach, when asked.<\/p>\n The healthcare benefits company is the latest Fortra customer to confirm it was affected by the January breach. U.S. healthcare giant Community Health Systems was the first confirmed victim<\/a> and one of the worst affected, with the hackers claiming to have stolen data on at least one million patients. Consumer goods giant Procter & Gamble, healthcare program provider US Wellness, investment giant Onex, the U.K.\u2019s Pension Protection Fund, Brightline<\/a>, and the City of Toronto have all confirmed data thefts<\/a> following the hack.<\/p>\n Fortra has faced criticism for its poor handling of the breach, which included hiding details of the zero-day exploit behind a customer login wall. News of the breach only came to light when security reporter Brian Krebs published the company\u2019s hidden disclosure<\/a> online. Fortra patched the vulnerability a week later.<\/p>\n TechCrunch reported that Fortra told some customers that their data was safe<\/a>, only to find that their data was stolen after hackers sent a ransom demand.<\/p>\n NationsBenefits acknowledged in its statement that, \u201cOnly after we contacted Fortra did they confirm the existence of the vulnerability.\u201d<\/p>\n In its first public acknowledgement of the breach, Fortra said in a blog post<\/a> Tuesday that customers running their own on-premise server were hacked almost two weeks before Fortra\u2019s hosted systems were compromised.<\/p>\n Fortra spokesperson Rachel Woodford declined to say how many customers are affected or comment beyond the company\u2019s blog post.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nNationsBenefits confirms thousands had personal data stolen in Fortra breach<\/br>
\n2023-04-19 21:42:18<\/br><\/p>\n