vcdb / validation.csv
guidobenb's picture
Upload 3 files
cd15950 verified
entities,text
"[{'class': 'ACTOR', 'end': 138, 'start': 133}, {'class': 'ACTION', 'end': 152, 'start': 139}, {'class': 'ASSETS', 'end': 160, 'start': 153}, {'class': 'ACTION', 'end': 182, 'start': 165}, {'class': 'ACTION', 'end': 264, 'start': 250}, {'class': 'ACTION', 'end': 278, 'start': 266}, {'class': 'ACTION', 'end': 309, 'start': 283}]","Looks like a Partner ""Baas was the computer systems administrator for a Cincinnati company that did business with Acxiom"" (victim). Actor had access to systems and downloaded a file he shouldn't have had access too (guessing /etc/shadow or passwd), ran pw cracker, came back in and stole customer information (Personal data);"
"[{'class': 'ACTION', 'end': 32, 'start': 3}, {'class': 'ASSETS', 'end': 45, 'start': 36}, {'class': 'ACTION', 'end': 109, 'start': 93}, {'class': 'ACTION', 'end': 164, 'start': 157}, {'class': 'ASSETS', 'end': 209, 'start': 201}, {'class': 'ACTION', 'end': 312, 'start': 305}, {'class': 'ASSETS', 'end': 406, 'start': 397}]","An administrative error resulted in documents with sensitive information from Unisys members being emailed to an incorrect party associated with Unisys. The mistake occurred on December 13, 2012. The document may have contained names, Social Security numbers, dates of birth, and salary information. The mistake was immediately noticed by the recipient and the information was deleted from their computer.;"
"[{'class': 'ACTION', 'end': 49, 'start': 10}, {'class': 'ACTION', 'end': 120, 'start': 100}, {'class': 'ACTION', 'end': 253, 'start': 237}, {'class': 'ACTOR', 'end': 265, 'start': 258}, {'class': 'ACTION', 'end': 297, 'start': 266}, {'class': 'ASSETS', 'end': 338, 'start': 326}, {'class': 'ASSETS', 'end': 423, 'start': 412}, {'class': 'ASSETS', 'end': 537, 'start': 529}]","MUSC says it has had its financial records hacked and credit card information for some 7,000 people has been compromised, according to area reports. At some point between June 30 and August 21, the records of Blackhawk Consulting Group were compromised and hackers got the credit card information for patients who used their credit cards to paid medical bills, reports say. However, individuals who paid with a credit card in person and individuals who paid an MUSC bill by check or cash are not affected, according to the MUSC website.;"
"[{'class': 'ACTION', 'end': 20, 'start': 0}, {'class': 'ASSETS', 'end': 49, 'start': 42}, {'class': 'ACTION', 'end': 152, 'start': 104}]","Malware installed on the Backcountry Gear website for about three months beginning in late April likely resulted in a compromise of customer information, including payment card data.;"
"[{'class': 'ASSETS', 'end': 3, 'start': 0}, {'class': 'ASSETS', 'end': 48, 'start': 35}, {'class': 'ACTION', 'end': 77, 'start': 49}]",ATM Overlay that actually captured physical card was installed then retrieved;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ASSETS', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 47, 'start': 9}]","gas pump skimmer, found by employees before use;"
"[{'class': 'ASSETS', 'end': 71, 'start': 56}, {'class': 'ACTION', 'end': 110, 'start': 72}, {'class': 'ASSETS', 'end': 168, 'start': 159}, {'class': 'ACTION', 'end': 247, 'start': 241}, {'class': 'ASSETS', 'end': 545, 'start': 539}, {'class': 'ASSETS', 'end': 728, 'start': 719}, {'class': 'ASSETS', 'end': 826, 'start': 817}, {'class': 'ASSETS', 'end': 913, 'start': 904}]","n investigation has been launched into how confidential medical records were found in a garden in Londonderry. The Western Health Trust has confirmed that the documents contained ""sensitive personal information"" and said it had reported the breach to the Information Commissioner's office. The trust said a local newspaper and a member of the public brought the matter to its attention on Tuesday. The editor of the Derry News, Ciaran O'Neill, said it involved 17 patients. ""The details of 13 women and four men were on eight A4 sheets of papers,"" he said. ""There are a few lines on each and they go into intimate detail about their treatment, condition and their past history."" Mr O'Neill said the woman who found the documents in her garden ""was shocked"". ""She found it hard to believe that these could be hospital documents,"" he said. ""We contacted the Western trust and they confirmed that they were documents relating to local patients."" A spokesperson for the trust said they had now secured the information and had a full investigation was under way.;"
"[{'class': 'ACTION', 'end': 29, 'start': 14}, {'class': 'ACTION', 'end': 48, 'start': 39}, {'class': 'ACTOR', 'end': 71, 'start': 52}]",Groupe Reorev had data stolen and then encrypted by ransomware group LV;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTOR', 'end': 5, 'start': 0}, {'class': 'ACTION', 'end': 19, 'start': 6}]","actor gained access and maintained for 3 months, getting over 50,000 personal information, credit cards and username/password combinations.;"
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 15, 'start': 9}, {'class': 'ASSETS', 'end': 21, 'start': 16}, {'class': 'ASSETS', 'end': 49, 'start': 37}]",Employee shared X-Ray of patients on social media ;
"[{'class': 'ASSETS', 'end': 7, 'start': 0}, {'class': 'ACTION', 'end': 14, 'start': 8}, {'class': 'ACTION', 'end': 47, 'start': 19}]",website hacked and information sold on dark web;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTOR', 'end': 13, 'start': 2}, {'class': 'ASSETS', 'end': 82, 'start': 69}, {'class': 'ACTION', 'end': 110, 'start': 86}, {'class': 'ASSETS', 'end': 130, 'start': 119}, {'class': 'ACTOR', 'end': 192, 'start': 175}, {'class': 'ACTION', 'end': 239, 'start': 234}, {'class': 'ACTION', 'end': 276, 'start': 244}, {'class': 'ACTOR', 'end': 353, 'start': 346}, {'class': 'ASSETS', 'end': 436, 'start': 425}, {'class': 'ACTOR', 'end': 477, 'start': 470}, {'class': 'ACTION', 'end': 528, 'start': 478}, {'class': 'ACTOR', 'end': 614, 'start': 607}, {'class': 'ACTION', 'end': 721, 'start': 671}]","A beer vendor was arrested Sunday at Hard Rock Stadium after using a Square reader to charge more than $700 to a fan's credit card during a Miami Dolphins game, police said. Nathaniel Collier, 33, faces charges of third-degree grand theft and possession of a skimming device. According to an arrest affidavit, the victim ordered two beers from Collier during Miami's 30-10 loss to the Los Angeles Chargers and gave him his credit card to pay for them. But police said Collier used his personal card reader to charge the victim $724. The victim was notified of the charge by his bank a short time later. Collier was taken into custody without incident. Police said he had a Square credit card reader in his possession.;"
[],;
"[{'class': 'ASSETS', 'end': 103, 'start': 95}, {'class': 'ACTION', 'end': 187, 'start': 104}]",Millions of voters had theri PII provided to direct marketing agencies against their wishes. A software error redacted their opt-out of having their information provided to third parties.;
"[{'class': 'ACTION', 'end': 53, 'start': 19}, {'class': 'ACTION', 'end': 119, 'start': 60}]",Retailer discovers malware on their online storefront which is copying off customer data including credit card numbers.;
"[{'class': 'ACTOR', 'end': 24, 'start': 18}, {'class': 'ACTOR', 'end': 140, 'start': 93}, {'class': 'ACTOR', 'end': 251, 'start': 227}, {'class': 'ACTOR', 'end': 515, 'start': 508}, {'class': 'ACTION', 'end': 554, 'start': 516}, {'class': 'ACTION', 'end': 882, 'start': 844}, {'class': 'ACTION', 'end': 962, 'start': 942}, {'class': 'ACTION', 'end': 1017, 'start': 971}, {'class': 'ACTION', 'end': 1111, 'start': 1050}, {'class': 'ACTOR', 'end': 1160, 'start': 1152}, {'class': 'ACTION', 'end': 1376, 'start': 1364}, {'class': 'ACTOR', 'end': 1431, 'start': 1424}, {'class': 'ACTOR', 'end': 1589, 'start': 1582}, {'class': 'ACTION', 'end': 1727, 'start': 1676}, {'class': 'ACTOR', 'end': 1793, 'start': 1786}, {'class': 'ASSETS', 'end': 1808, 'start': 1799}, {'class': 'ACTION', 'end': 1941, 'start': 1878}, {'class': 'ACTION', 'end': 2035, 'start': 1983}, {'class': 'ACTOR', 'end': 2043, 'start': 2036}, {'class': 'ACTION', 'end': 2141, 'start': 2113}, {'class': 'ACTION', 'end': 2281, 'start': 2272}, {'class': 'ACTOR', 'end': 2338, 'start': 2331}, {'class': 'ACTOR', 'end': 2636, 'start': 2629}, {'class': 'ACTOR', 'end': 2966, 'start': 2959}]","An emergency room doctor from St. Albert has been suspended for at least a month because she illegally tapped into restricted medical files. The College of Physicians & Surgeons of Alberta announced this week that it had found Deanne Dee Gayle Watrich, an emergency room doctor and a St. Albert resident, to be guilty of unprofessional conduct. Watrich had previously admitted to unprofessional conduct at a hearing tribunal held by the college last November. Specifically, the tribunal wrote in its ruling, Watrich accessed the electronic health records of three people 21 times between Aug. 5, 2009, and May 2, 2010, without having a patient/physician relationship with those people. Its okay for doctors to access patient records if they are actually treating those patients, explained college spokesperson Kelly Eby, but not otherwise. She accessed the electronic health records of three people who she was not treating, she said. Its an invasion of privacy. It also violates the provincial Health Professions Act and Health Information Act, and goes against the Canadian Medical Associations Code of Ethics and the colleges standards of practice. Watrichs case started when the provincial privacy commission began investigating a complaint from a man who had requested an Alberta Netcare log. The log showed that nine doctors, none of whom were treating him, had accessed his electronic health records. He alleged that Watrich might be the one responsible. The man listed his partner and mother as co-complainants, both of whom had their files accessed by three other doctors. Watrich admitted to the privacy commissioner and to the tribunal that she was responsible for accessing these restricted records using the logins of 12 other doctors. On 21 occasions, the tribunal heard, Watrich used computers in the emergency department of the Edmonton Misericordia Hospital to access these records after the previous user had not logged out, and did so knowing that her personal ID would not show up in the computers logs as a result. Watrich was in a personal relationship with one of the complainants when she accessed some of the records, the tribunal found, and in a relationship with the former spouse of said complainant when she accessed others. I dont know why I logged in to their Netcare and why I did it so many times, Watrich said at the hearing last November. It didnt actually give me any power. It didn't give me anything. In retrospect, she believed accessing these records might have been a way for her to cope with the difficult divorce and child-custody proceedings her partner was going through at the time. Watrich told the tribunal that she was humiliated and embarrassed by her actions and deeply disappointed in (herself). She had apologized to the complainants, and paid a significant monetary settlement to them in a related lawsuit. Covenant Health (which runs the Misericordia) had also put a reprimand on her record. Even though Watrich didnt disclose any of the information she accessed, the tribunal ruled, her actions were done repeatedly and with intent to deceive, and impugned the reputation of her fellow physicians.;"
"[{'class': 'ASSETS', 'end': 49, 'start': 42}, {'class': 'ACTION', 'end': 73, 'start': 62}]",Kaiser Permanente says 600 Riverside area members affected by data breach;
"[{'class': 'ACTOR', 'end': 44, 'start': 29}, {'class': 'ACTION', 'end': 96, 'start': 74}, {'class': 'ACTION', 'end': 155, 'start': 97}]",City of Miami Police Officer Malinsky Bazile was found guilty Thursday of using his job to steal hundreds of people's identities and commit identity theft.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 83, 'start': 49}, {'class': 'ACTION', 'end': 125, 'start': 89}, {'class': 'ACTION', 'end': 510, 'start': 482}, {'class': 'ACTOR', 'end': 525, 'start': 512}, {'class': 'ACTION', 'end': 564, 'start': 526}, {'class': 'ASSETS', 'end': 593, 'start': 584}, {'class': 'ACTION', 'end': 728, 'start': 716}, {'class': 'ACTOR', 'end': 1060, 'start': 1046}, {'class': 'ACTION', 'end': 1077, 'start': 1061}, {'class': 'ASSETS', 'end': 1095, 'start': 1078}, {'class': 'ASSETS', 'end': 1198, 'start': 1178}, {'class': 'ASSETS', 'end': 1219, 'start': 1203}, {'class': 'ACTOR', 'end': 1404, 'start': 1391}, {'class': 'ACTION', 'end': 1436, 'start': 1405}, {'class': 'ASSETS', 'end': 1515, 'start': 1496}, {'class': 'ACTION', 'end': 1718, 'start': 1701}, {'class': 'ASSETS', 'end': 1770, 'start': 1750}, {'class': 'ASSETS', 'end': 1783, 'start': 1771}, {'class': 'ACTION', 'end': 1929, 'start': 1916}, {'class': 'ASSETS', 'end': 1942, 'start': 1930}, {'class': 'ACTION', 'end': 1951, 'start': 1943}, {'class': 'ACTOR', 'end': 1964, 'start': 1952}, {'class': 'ACTION', 'end': 2249, 'start': 2239}, {'class': 'ACTOR', 'end': 2378, 'start': 2367}, {'class': 'ACTION', 'end': 3173, 'start': 3111}]","CareFirst BlueCross BlueShield on Wednesday said it had been hit with a data breach that compromised the personal information on approximately 1.1 million customers. There are indications that the same attack methods may have been used in this intrusion as with breaches at Anthem and Premera, incidents that collectively involved data on more than 90 million Americans. On May 20, 2015, CareFirst BlueCross BlueShield (CareFirst) announced that the company has been the target of a sophisticated cyberattack. The attackers gained limited, unauthorized access to a single CareFirst database. This was discovered as a part of the company's ongoing Information Technology (IT) security efforts in the wake of recent cyberattacks on health insurers. CareFirst engaged Mandiant __ one of the world's leading cybersecurity firms __ to conduct an end-to-end examination of its IT environment. This review included multiple, comprehensive scans of the CareFirst's IT systems for any evidence of a cyberattack. The review determined that in June 2014 cyberattackers gained access to a single database in which CareFirst stores data that members and other individuals enter to access CareFirst's websites and online services. Mandiant completed its review and found no indication of any other prior or subsequent attack or evidence that other personal information was accessed. Evidence suggests the attackers could have potentially acquired member-created user names created by individuals to access CareFirst's website, as well as members' names, birth dates, email addresses and subscriber identification number. However, CareFirst user names must be used in conjunction with a member-created password to gain access to underlying member data through CareFirst's website. The database in question did not include these passwords because they are fully encrypted and stored in a separate system as a safeguard against such attacks. The database accessed by attackers contained no member Social Security numbers, medical claims, employment, credit card, or financial information. ""We deeply regret the concern this attack may cause"", said CareFirst President and CEO Chet Burrell. ""We are making sure those affected understand the extent of the attack __ and what information was and was not affected. Even though the information in question would be of limited use to an attacker, we want to protect our members from any potential use of their information and will be offering free credit monitoring and identity theft protection for those affected for two years."" Approximately 1.1 million current and former CareFirst members and individuals who do business with CareFirst online who registered to use CareFirst's websites prior to June 20, 2014 are affected by this event. All affected members will receive a letter from CareFirst offering two free years of credit monitoring and identity theft protection. The letters will contain an activation code and you must have the letter to enroll in the offered protections. Out of an abundance of caution, CareFirst has blocked member access to these accounts and will request that members create new user names and passwords.;"
"[{'class': 'ACTION', 'end': 42, 'start': 27}, {'class': 'ACTION', 'end': 183, 'start': 130}, {'class': 'ASSETS', 'end': 223, 'start': 214}, {'class': 'ACTION', 'end': 267, 'start': 228}, {'class': 'ASSETS', 'end': 297, 'start': 286}, {'class': 'ACTION', 'end': 374, 'start': 346}, {'class': 'ACTION', 'end': 421, 'start': 384}, {'class': 'ACTION', 'end': 485, 'start': 442}]",point-of-sale content unit was compromised company was notified by city from services and Secret Service is suspicious that these were occurring during credit card swipe at the store. Technicians also examined the computers and certain suspicious processes running on the point-of-sale fileserver. Upon further investigation it became clear that these processes were malware and that they appear to be taking snapshots of network traffic and setting aside cardholder data and log file.;
"[{'class': 'ACTION', 'end': 16, 'start': 0}, {'class': 'ASSETS', 'end': 40, 'start': 17}]","internet exposed Elastic Search database of 260,000 pii records;"
"[{'class': 'ACTION', 'end': 113, 'start': 93}, {'class': 'ASSETS', 'end': 200, 'start': 191}, {'class': 'ASSETS', 'end': 372, 'start': 367}, {'class': 'ASSETS', 'end': 380, 'start': 373}, {'class': 'ASSETS', 'end': 496, 'start': 486}, {'class': 'ACTION', 'end': 530, 'start': 497}]","Security researchers with vpnMentor recently discovered that retail consultancy firm Aliznet was leaking the data of 2.5 million Canadian Yves Rocher customers via an unsecured Elasticsearch database. The exposed data includes names, phone numbers, email addresses, dates of birth and postcodes. In addition, the researchers found six million customer orders on the leaky server. The orders mentioned a unique customer ID that made it possible to link them to clients in the database. The server also exposed detailed information about the business operations of Yves Rocher that could be of significant value to the cosmetic giant’s competitors.;"
"[{'class': 'ACTION', 'end': 6, 'start': 0}, {'class': 'ASSETS', 'end': 25, 'start': 19}, {'class': 'ACTION', 'end': 73, 'start': 30}]",Breach on internal system via unknown method leads to medical record loss;
"[{'class': 'ACTION', 'end': 118, 'start': 103}, {'class': 'ACTOR', 'end': 132, 'start': 122}, {'class': 'ACTION', 'end': 200, 'start': 146}, {'class': 'ACTION', 'end': 403, 'start': 344}, {'class': 'ACTION', 'end': 443, 'start': 407}, {'class': 'ACTION', 'end': 639, 'start': 604}, {'class': 'ACTION', 'end': 917, 'start': 896}, {'class': 'ACTION', 'end': 1059, 'start': 1053}, {'class': 'ACTION', 'end': 1161, 'start': 1141}, {'class': 'ACTION', 'end': 1219, 'start': 1170}, {'class': 'ACTION', 'end': 1767, 'start': 1752}, {'class': 'ACTION', 'end': 1986, 'start': 1964}, {'class': 'ACTION', 'end': 2586, 'start': 2571}]","The L.A. Gay & Lesbian Center recently learned that the security of certain of our information systems was compromised by a criminal cyber attack apparently designed to collect social security numbers, credit card numbers and other financial information. Between November 22, 2013 and December 3, 2013 our forensic investigators confirmed that this attack potentially exposed certain of your information to unauthorized access and acquisition. I say potentially because, to date, there is no evidence that any information was actually accessed or acquired as a result of this criminal invasion. However, the information potentially exposed may have included your name, contact information, medical or healthcare information, date of birth, credit card information, Social Security number and health insurance account number. Based upon our investigation, the period during which your information may have been exposed appears to have been between September 17, 2013 and November 8, 2013. Out of an abundance of caution, we want to make you aware of the attack and our efforts to help safeguard your information. Immediately upon learning of this criminal attack and the potential exposure of private patient information, the Center took action. Specifically, upon learning of the potential of this incident, we promptly took the following actions: (i) curtailed the intrusion; (ii) hired numerous experts, including two leading national forensic investigation firms, to help us investigate the situation and determine the individuals and information potentially affected; and (iii) began the process of notifying potentially affected individuals. In addition, we have notified law enforcement and are taking steps to further guard against this type of criminal attack in the future. As always, we recommend that you remain vigilant by reviewing your explanation of benefits for medical services and financial account statements, as well as free credit reports for unauthorized activity. From the moment we learned of the potential exposure, our primary concern has been ensuring that you are protected against risks related to this incident. Therefore, we have engaged Experian, one of the leading providers of credit monitoring products, to provide you with its ProtectMyID Alert membership, including credit monitoring, for one year at no cost to you. Enclosed with this letter is information regarding these services and instructions for enrollment, as well as an insert providing additional useful information regarding steps you can take to protect yourself against identity theft. We have also engaged Experian to provide a dedicated call center to answer questions about this incident. If you have any questions regarding this incident or would like assistance enrolling in ProtectMyID Alert, please contact the Experian call center at 888-451-6562 from 6:00 AM to 6:00 PM, Pacific Time, Monday through Friday, or 8:00 AM to 5:00 PM, Pacific Time, Saturday and Sunday.;"
"[{'class': 'ACTION', 'end': 713, 'start': 693}, {'class': 'ASSETS', 'end': 740, 'start': 723}, {'class': 'ACTOR', 'end': 833, 'start': 824}, {'class': 'ACTION', 'end': 860, 'start': 834}, {'class': 'ASSETS', 'end': 889, 'start': 873}, {'class': 'ACTION', 'end': 927, 'start': 894}, {'class': 'ACTION', 'end': 1115, 'start': 1094}]","Bar applicants need to supply every single piece of personal information imaginable, from their birthday and Social Security number to their 10-year work history. If anyone with criminal intent ever got their hands on that information, we cant even begin to describe how screwed those poor bar applicants would be. As it turns out, some bar applicants are getting a taste of what it feels like to be violated by a state bar outside of a timed test-taking situation. Which state bar just exposed an untold number of exam applicants to identity theft due to a break-in? The State Bar of Nevada recently advised an undisclosed number of applicants that their confidential personal information may have been stolen from its storage facility. Heres the letter, in pertinent part: The State Bar of Nevada has learned that criminals have forced their way into a State Bar storage facility and stolen some confidential records. Through investigation and in cooperation with the Las Vegas Metropolitan Police Department we discovered that information furnished by you to the State Bar of Nevada may have been stolen. The State Bar has taken measures to secure all records to counter subsequent thefts and breaches in security.;"
"[{'class': 'ACTION', 'end': 72, 'start': 53}, {'class': 'ACTION', 'end': 173, 'start': 153}, {'class': 'ACTION', 'end': 215, 'start': 178}]","A dentist office in Maitland is the latest victim of a ransomware attack in Seminole County. Dr. Carl Bilancione said all of his Quickbooks accounting files were encrypted and a pop-up screen instructed him to pay $10,000. Every 48 hours, the ransom would double, according to the message.;"
"[{'class': 'ACTION', 'end': 92, 'start': 80}, {'class': 'ACTOR', 'end': 103, 'start': 96}, {'class': 'ACTION', 'end': 213, 'start': 201}, {'class': 'ACTOR', 'end': 224, 'start': 217}, {'class': 'ACTION', 'end': 326, 'start': 298}, {'class': 'ACTION', 'end': 366, 'start': 342}, {'class': 'ACTION', 'end': 919, 'start': 910}, {'class': 'ASSETS', 'end': 973, 'start': 967}, {'class': 'ASSETS', 'end': 1091, 'start': 1075}, {'class': 'ACTOR', 'end': 1926, 'start': 1919}, {'class': 'ACTION', 'end': 1992, 'start': 1927}, {'class': 'ASSETS', 'end': 2024, 'start': 2015}, {'class': 'ASSETS', 'end': 2117, 'start': 2110}, {'class': 'ASSETS', 'end': 2137, 'start': 2122}, {'class': 'ASSETS', 'end': 2194, 'start': 2187}, {'class': 'ACTION', 'end': 2999, 'start': 2959}, {'class': 'ASSETS', 'end': 3095, 'start': 3078}, {'class': 'ACTOR', 'end': 3285, 'start': 3278}, {'class': 'ACTION', 'end': 3296, 'start': 3286}, {'class': 'ASSETS', 'end': 3308, 'start': 3301}, {'class': 'ASSETS', 'end': 3381, 'start': 3375}, {'class': 'ACTION', 'end': 3980, 'start': 3969}, {'class': 'ACTOR', 'end': 4097, 'start': 4090}, {'class': 'ACTION', 'end': 4115, 'start': 4098}, {'class': 'ASSETS', 'end': 4147, 'start': 4131}, {'class': 'ASSETS', 'end': 4178, 'start': 4171}, {'class': 'ACTION', 'end': 4275, 'start': 4265}, {'class': 'ACTOR', 'end': 4380, 'start': 4371}, {'class': 'ACTOR', 'end': 4562, 'start': 4555}, {'class': 'ACTION', 'end': 4779, 'start': 4773}, {'class': 'ACTOR', 'end': 4801, 'start': 4794}, {'class': 'ACTION', 'end': 4868, 'start': 4802}, {'class': 'ASSETS', 'end': 4908, 'start': 4892}, {'class': 'ACTOR', 'end': 5002, 'start': 4995}, {'class': 'ACTION', 'end': 5036, 'start': 5011}, {'class': 'ACTOR', 'end': 5256, 'start': 5249}, {'class': 'ASSETS', 'end': 5287, 'start': 5274}, {'class': 'ASSETS', 'end': 5390, 'start': 5382}, {'class': 'ACTION', 'end': 5555, 'start': 5549}, {'class': 'ACTION', 'end': 6273, 'start': 6266}]","The Manhattan headquarters of JPMorgan Chase, which securities filings revealed was attacked by hackers over the summer. The Manhattan headquarters of JPMorgan Chase, which securities filings revealed was attacked by hackers over the summer. Documents: JPMorgans S.E.C. Filing Updated, 9:03 p.m. | A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever. The details of the breach disclosed in a securities filing on Thursday emerge at a time when consumer confidence in the digital operations of corporate America has already been shaken. Target, Home Depot and a number of other retailers have sustained major data breaches. Last year, the information of 40 million cardholders and 70 million others were compromised at Target, while an attack at Home Depot in September affected 56 million cards. But unlike retailers, JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers credit card details and potentially includes more sensitive data. Weve migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects, said Dan Kaminsky, a researcher who works as chief scientist at White Ops, a security company. Until just a few weeks ago, executives at JPMorgan said they believed that only one million accounts were affected, according to several people with knowledge of the attacks. As the severity of the intrusion which began in June but was not discovered until July became more clear in recent days, bank executives scrambled for the second time in three months to contain the fallout and to reassure skittish customers that no money had been taken and that their financial information remained secure. The hackers appeared to have obtained a list of the applications and programs that run on JPMorgans computers a road map of sorts which they could crosscheck with known vulnerabilities in each program and web application, in search of an entry point back into the banks systems, according to several people with knowledge of the results of the banks forensics investigation, all of whom spoke on the condition of anonymity. Operating overseas, the hackers gained access to the names, addresses, phone numbers and emails of JPMorgan account holders. In its regulatory filing on Thursday, JPMorgan said that there was no evidence that account information, including passwords or Social Security numbers, had been taken. The bank also noted that there was no evidence of fraud involving the use of customer information. Still, until the JPMorgan breach surfaced in July, banks were viewed as relatively safe from online assaults because of their investment in defenses and trained security staff. Most previous breaches at banks have involved stealing personal identification numbers for A.T.M. accounts, not burrowing deep into the internal workings of a banks computer systems. Even if no customer financial information was taken, the apparent breadth and depth of the JPMorgan attack shows how vulnerable Wall Street institutions are to cybercrime. In 2011, hackers broke into the systems of the Nasdaq stock market, but did not penetrate the part of the system that handles trades. Jamie Dimon, JPMorgans chairman and chief executive, has acknowledged the growing digital threat. In his annual letter to shareholders, Mr. Dimon said, Were making good progress on these and other efforts, but cyberattacks are growing every day in strength and velocity across the globe. Even though the bank has fortified its defenses against the attacks, Mr. Dimon wrote, the battle is continual and likely never-ending. On Thursday, some lawmakers weighed in. Edward J. Markey, Democrat of Massachusetts and a member of the Senate Commerce Committee, said the data breach at JPMorgan Chase is yet another example of how Americans most sensitive personal information is in danger. Hackers drilled deep into the banks vast computer systems, reaching more than 90 servers, the people with knowledge of the investigation said. As they analyze the contours of the breach, investigators in law enforcement remain puzzled, partly because there is no evidence that the attackers looted any money from customer accounts. That lack of any apparent profit motive has generated speculation among the law enforcement officials and security experts that the hackers, which some thought to be from Russia and may have been sponsored by elements of the Russian government, the people with knowledge of the investigation said. By the time the banks security team discovered the breach in late July, hackers had already obtained the highest level of administrative privilege to dozens of the banks computer servers, according to the people with knowledge of the investigation. It is still unclear how hackers managed to gain such deep access. The people with knowledge of the investigation said it would take months for the bank to swap out its programs and applications and renegotiate licensing deals with its technology suppliers, possibly giving the hackers time to mine the banks systems for unpatched, or undiscovered, vulnerabilities that would allow them re-entry into JPMorgans systems. Beyond its disclosures, JPMorgan did not comment on what its investigation had found. Kristin Lemkau, a JPMorgan spokeswoman, said that describing the banks breach as among the largest was comparing apples and oranges. Preparing for the disclosure on Thursday, JPMorgan retained the law firm WilmerHale to help with its regulatory filing with the Securities and Exchange Commission, people with knowledge of the matter said. Earlier on Thursday, some executives Barry Sommers, the chief executive of Chases consumer bank flew back to New York from Naples, Fla., where they had convened for a leadership conference, these people said. The initial discovery of the hack sent chills down Wall Street and prompted an investigation by the Federal Bureau of Investigation. The bank was also forced to update its regulators, including the Federal Reserve, on the extent of the breach. Faced with the rising threat of online crime, JPMorgan has said it plans to spend $250 million on digital security annually, but had been losing many of its security staff to other banks over the last year, with others expected to leave soon.;"
"[{'class': 'ACTION', 'end': 64, 'start': 22}]",Oxfam Australia found their data up for sale in a criminal forum ;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
[],;
"[{'class': 'ACTOR', 'end': 78, 'start': 48}, {'class': 'ACTION', 'end': 100, 'start': 92}, {'class': 'ASSETS', 'end': 118, 'start': 111}, {'class': 'ASSETS', 'end': 145, 'start': 133}]","The U.S. Department of Energy has admitted that unidentified malicious hackers successfully breached 14 of its servers and 20 of its workstations two weeks ago, making off with personal information belonging to several hundred employees. The department's assurances that ""no classified data was compromised"" come as little comfort, however, considering the department's spotty security history. ""It's a continuing story of negligence,"" Ed McCallum, former director of the department's office of safeguards and security, told the Free Beacon. ""[The department] is on the cutting edge of some of the most sophisticated military and intelligence technology the country owns and it is being treated frivolously by the Department of Energy and its political masters."";"
"[{'class': 'ASSETS', 'end': 3, 'start': 0}, {'class': 'ACTION', 'end': 11, 'start': 4}]",ATM skimmer;
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 83, 'start': 61}, {'class': 'ASSETS', 'end': 92, 'start': 84}]",employee was arrested in Visalia on Thursday on suspicion of fraudulently accessing computer data ;
"[{'class': 'ACTION', 'end': 49, 'start': 32}, {'class': 'ASSETS', 'end': 94, 'start': 86}]","Medisys Health Group reported a ransomware attack impacting the information of 60,000 patients;"
"[{'class': 'ASSETS', 'end': 6, 'start': 0}, {'class': 'ACTION', 'end': 33, 'start': 7}]",Server stole for storage facility ;
"[{'class': 'ACTOR', 'end': 10, 'start': 0}, {'class': 'ACTOR', 'end': 23, 'start': 12}, {'class': 'ACTION', 'end': 32, 'start': 25}, {'class': 'ACTION', 'end': 160, 'start': 139}]","anon group ""Raptor Swag"" hacking Chinese, ""China Chamber of International Commerce (CCOIC) Zhejiang Chamber of Commerce (ccpitzj.gov.cn)"" through SQLinjection. ;"
"[{'class': 'ACTION', 'end': 22, 'start': 18}, {'class': 'ACTION', 'end': 66, 'start': 47}]",City of Stratford paid $75k after experiencing a ransomware attack;
"[{'class': 'ACTION', 'end': 109, 'start': 59}, {'class': 'ACTION', 'end': 154, 'start': 148}]",On 04/22/13 a Veteran and the Veteran's wife reported that they received medical record information in error. The information was released by VA in error. In
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 72, 'start': 51}]",Patient information from North Cumbria's hospitals were lost on a train. ;
[],Eight (8) patients will receive a letter offering credit protection services.;
"[{'class': 'ASSETS', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 27, 'start': 10}]",documents found in dumpster;
"[{'class': 'ACTOR', 'end': 19, 'start': 11}, {'class': 'ACTION', 'end': 51, 'start': 46}, {'class': 'ACTION', 'end': 102, 'start': 78}]",McDonald's employee is being investigated for fraud after it was found he was allegedly card skimming.;
"[{'class': 'ACTOR', 'end': 24, 'start': 2}, {'class': 'ASSETS', 'end': 124, 'start': 114}, {'class': 'ACTION', 'end': 180, 'start': 125}, {'class': 'ACTION', 'end': 200, 'start': 185}, {'class': 'ACTION', 'end': 327, 'start': 307}, {'class': 'ACTOR', 'end': 340, 'start': 333}, {'class': 'ASSETS', 'end': 484, 'start': 469}]","A Devon doctors’ surgery that attempted to improve its service for patients has seen its efforts backfire after a newsletter was sent out with patients’ email addresses on display. The security breach affected around 1,000 patients of Pembroke House Surgery in Paignton on Tuesday afternoon. Following the administrative error, the surgery wrote to patients to apologise for any concern or inconvenience caused and to reassure them that no other details besides their email addresses had been divulged.;"
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 32, 'start': 10}, {'class': 'ACTION', 'end': 78, 'start': 39}, {'class': 'ASSETS', 'end': 117, 'start': 107}]",Attackers leverage IE10 zero day and a watering hole attack to install malware on US Department of Defense computers.;
"[{'class': 'ASSETS', 'end': 12, 'start': 5}, {'class': 'ACTION', 'end': 130, 'start': 117}, {'class': 'ACTION', 'end': 179, 'start': 136}]","""The website of Radio Free Europe/ Radio Liberty, a media organization that has 700 journalists across 21 countries, was disrupted by a distributed denial-of-service (DDOS) attack on Sunday, just as it was providing extensive coverage on the ongoing protests in Kiev, Ukraine."";"
"[{'class': 'ASSETS', 'end': 11, 'start': 0}, {'class': 'ACTION', 'end': 68, 'start': 53}, {'class': 'ASSETS', 'end': 185, 'start': 174}, {'class': 'ACTOR', 'end': 235, 'start': 219}, {'class': 'ACTOR', 'end': 263, 'start': 248}, {'class': 'ACTION', 'end': 277, 'start': 267}, {'class': 'ACTION', 'end': 360, 'start': 337}, {'class': 'ASSETS', 'end': 369, 'start': 361}, {'class': 'ACTION', 'end': 397, 'start': 374}, {'class': 'ACTION', 'end': 575, 'start': 561}, {'class': 'ASSETS', 'end': 626, 'start': 620}, {'class': 'ACTION', 'end': 713, 'start': 691}, {'class': 'ASSETS', 'end': 843, 'start': 836}, {'class': 'ACTION', 'end': 996, 'start': 964}]","The website of the Jamaica Information Service (JIS) has been hacked, but the management is seeking to assure that critical information has not been compromised. A visit to the website revealed the following message: ""hacked by Holako"". However, the perpetrator of the attack was not immediately clear. On a subsequent visit, another message appeared saying the site was ""down for maintenance"". The JIS is the Government of Jamaica's main media and information arm. Contacted last this evening, the JIS CEO, Donna-Marie Rowe, said no sensitive information had been lost. ""The aggressor's attempts at breaching our system did not result in access to sensitive data but was constrained to 'surface defacement',"" she said in an email. ""Our security team is undertaking recovery and reinforcement procedures as we speak and the JIS website will resume normal function in short order."" This development comes weeks after the government warned its employees of a virus being sent via an email. ;"
"[{'class': 'ACTION', 'end': 75, 'start': 34}, {'class': 'ACTOR', 'end': 142, 'start': 120}, {'class': 'ACTION', 'end': 159, 'start': 147}, {'class': 'ASSETS', 'end': 225, 'start': 220}, {'class': 'ACTOR', 'end': 781, 'start': 747}, {'class': 'ACTION', 'end': 829, 'start': 786}, {'class': 'ACTION', 'end': 858, 'start': 842}, {'class': 'ACTION', 'end': 1191, 'start': 1101}]","On February 23, 2016, many people began receiving a fraudulent email titled ""Important Information: invoice 11471"" from an unauthorized person who had accessed Mayfield Brain & Spine's account at an outside vendor. This email was not sent by Mayfield. Mayfield notified recipients of the malicious email as soon as possible that same day, posted the information prominently on its website home page, and updated recipients again on February 25 with recommendations for remedy. Mayfield has completed its review and is issuing a final communication to all recipients by letter and also by distributing a press release of the incident and Mayfield's response since that time. As previously reported on WCPO TV in February, the email was generated by an unknown, unauthorized person who accessed the database of an outside vendor. This vendor sends, via email, newsletters, educational information, invitations, announcements, and other information about Mayfield to patients, business associates, event attendees, website contacts and other friends of Mayfield. Recipients of the fraudulent email who clicked on an attachment within it potentially triggered a download of a ransomware virus. According to Thomas Rosenberger, Vice President of Communications, ""The vendor receives only email addresses from Mayfield. No other health or financial information is shared. In this incident, no Mayfield systems were involved, and no patient health or financial information was compromised. Rosenberger added, ""Mayfield's first priority is always the well-being of our patients. Once we learned of the incident, we immediately communicated with recipients by email, by social media, and on our website, including both notification and instructions on how to remove the virus."" The communication included a free download of software to remove the malware. Mayfield has taken several steps to ensure that an incident like this does not happen again. These include working with the vendor's compliance office to understand what transpired, locking the account so it cannot be accessed, and working with a computer virus protection service to determine if the email and/or its attachment contained a virus. Mayfield has reviewed its policies and procedures to ensure that all patient information is secure. ""We are continuously monitoring the situation,"" Rosenberger said. ""With all of the action taken to date, we do not believe that recipients of the fraudulent email need to take any additional steps at this time."" If you have questions or concerns about this event, more information is available at MayfieldClinic.com, or you can contact us by toll-free telephone at 800-325-7787 or by email at Comments@MayfieldClinic.com. SOURCE: Mayfield Clinic The incident was reported on April 23 to HHS as impacting 23,341 patients.;"
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 46, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
[],Incident Update
"[{'class': 'ASSETS', 'end': 28, 'start': 13}, {'class': 'ACTION', 'end': 55, 'start': 29}]",Passwords to computer system were visible to the public;
"[{'class': 'ACTOR', 'end': 11, 'start': 0}, {'class': 'ACTOR', 'end': 92, 'start': 79}, {'class': 'ACTION', 'end': 137, 'start': 93}]",A physician stated on Friday that she had a protected Peer review at her home. The physician does not have proper authorization to remove PII from the VA.;
"[{'class': 'ACTOR', 'end': 46, 'start': 25}, {'class': 'ACTION', 'end': 106, 'start': 47}, {'class': 'ACTION', 'end': 110, 'start': 108}, {'class': 'ACTION', 'end': 133, 'start': 112}, {'class': 'ACTION', 'end': 155, 'start': 139}, {'class': 'ASSETS', 'end': 172, 'start': 164}, {'class': 'ACTION', 'end': 215, 'start': 173}]","Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;"
"[{'class': 'ACTION', 'end': 77, 'start': 36}]","Theyre among at least 50 people who had applications submitted in their names, without their knowledge, for Lifeline, a Scripps News investigation finds. TerraCom and its affiliate, YourTel America Inc., together provide Lifeline phone service in 21 states. Their issues reflect broader concerns about administration of the government program, which aims to ensure that low-income households have an open line to jobs and medical care. Former contract agents for TerraCom and YourTel told Scripps they forged application signatures, manufactured addresses and retained legitimate applicants Social Security numbers and other sensitive personal information.;"
"[{'class': 'ACTION', 'end': 18, 'start': 10}]",Patient A received a Medline Industries medical supply intended for Patient B.
"[{'class': 'ASSETS', 'end': 95, 'start': 88}, {'class': 'ACTION', 'end': 150, 'start': 96}, {'class': 'ASSETS', 'end': 224, 'start': 217}, {'class': 'ASSETS', 'end': 327, 'start': 319}, {'class': 'ASSETS', 'end': 477, 'start': 469}, {'class': 'ASSETS', 'end': 675, 'start': 667}, {'class': 'ACTION', 'end': 765, 'start': 738}]","On 03/19/15, 03/26/15, and 04/02/15, 61 potential research study participants were sent letters with incorrect addresses on three different occasions. Two participants contacted the facility to say that they received letters that included their address, but another person's name instead of theirs. Because the contact database contained information from Veterans who participated in research years ago, staff assumed that this meant that the addresses in that contact database were no longer valid. However, on the morning of 04/13/15, the primary investigator (PI), regulatory coordinator, and study coordinator reviewed the problem. They cross checked the contact database with the mail out recipient list and discovered that the list had been sorted incorrectly, which resulted in up to 61 instances of Veteran A receiving Veteran B's recruitment letter. The recruitment letter(s) indicate that the study being recruited for is a ""PTSD and Smoking Cessation"" study.;"
"[{'class': 'ACTOR', 'end': 7, 'start': 0}, {'class': 'ACTION', 'end': 27, 'start': 8}, {'class': 'ASSETS', 'end': 88, 'start': 71}, {'class': 'ACTION', 'end': 106, 'start': 90}, {'class': 'ACTION', 'end': 335, 'start': 322}]","Hackers were able to access customer credit card information stored on computer servers. The cyber attack affected customers who made purchases on www.thorlo.com between November 14, 2012 and January 22, 2013. Credit card numbers, credit card expiration dates, credit card security codes, names, and contact information were exposed. ;"
"[{'class': 'ACTOR', 'end': 6, 'start': 0}, {'class': 'ACTION', 'end': 38, 'start': 7}, {'class': 'ASSETS', 'end': 68, 'start': 57}, {'class': 'ACTOR', 'end': 88, 'start': 82}, {'class': 'ACTION', 'end': 108, 'start': 89}]","Hacker breaks into 25 million accounts at a South Korean web portal. Once in, the hacker sent spam messages.;"
"[{'class': 'ASSETS', 'end': 15, 'start': 0}, {'class': 'ACTION', 'end': 71, 'start': 40}]",Medical records of 24 hospital patients have been found dumped in a bin in Coventry.;
"[{'class': 'ACTOR', 'end': 6, 'start': 0}, {'class': 'ACTION', 'end': 38, 'start': 7}, {'class': 'ASSETS', 'end': 68, 'start': 57}, {'class': 'ACTOR', 'end': 88, 'start': 82}, {'class': 'ACTION', 'end': 108, 'start': 89}]","Hacker breaks into 25 million accounts at a South Korean web portal. Once in, the hacker sent spam messages.;"
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 83, 'start': 61}, {'class': 'ASSETS', 'end': 92, 'start': 84}]",employee was arrested in Visalia on Thursday on suspicion of fraudulently accessing computer data ;
"[{'class': 'ACTION', 'end': 43, 'start': 25}]",Incident associated with Miniduke campaign.;
"[{'class': 'ACTION', 'end': 70, 'start': 44}, {'class': 'ASSETS', 'end': 118, 'start': 102}, {'class': 'ACTION', 'end': 154, 'start': 130}, {'class': 'ASSETS', 'end': 219, 'start': 201}, {'class': 'ASSETS', 'end': 227, 'start': 221}, {'class': 'ASSETS', 'end': 250, 'start': 245}, {'class': 'ACTION', 'end': 299, 'start': 269}, {'class': 'ACTOR', 'end': 368, 'start': 347}, {'class': 'ACTION', 'end': 614, 'start': 596}, {'class': 'ACTION', 'end': 692, 'start': 680}, {'class': 'ACTION', 'end': 743, 'start': 732}, {'class': 'ACTION', 'end': 898, 'start': 875}]","At least 16 hospitals in the United Kingdom are being forced to divert emergency patients today after computer systems there were infected with ransomware, a type of malicious software that encrypts a victim’s documents, images, music and other files unless the victim pays for a key to unlock them. The ransomware is using an NSA exploit leaked by The Shadow Brokers, and has made tens of thousands of victims worldwide, including the Russian Interior Ministry, Chinese universities, Hungarian telcos, FedEx branches, and more. Cybersecurity firm Avast said it had identified more than 75,000 ransomware attacks in 99 countries, making it one of the broadest and most damaging cyberattacks in history. Avast said the majority of the attacks targeted Russia, Ukraine and Taiwan. But U.K. hospitals, Chinese universities and global firms like Fedex (FDX) also reported they had come under assault.;"
"[{'class': 'ACTION', 'end': 13, 'start': 0}, {'class': 'ASSETS', 'end': 16, 'start': 14}, {'class': 'ACTION', 'end': 59, 'start': 17}]","Misconfigured DB exposed Passport numbers, credit card data;"
"[{'class': 'ACTION', 'end': 34, 'start': 11}]",CoinWallet shut down after hacking;
"[{'class': 'ACTION', 'end': 149, 'start': 129}]",A VA Provider was concerned that coworkers entered their electronic medical record. A review of access confirmed 17 instances of unauthorized entries by 11
[],The ticket was reopened and changed to an incident. The complainant made a complaint to HHS OCR and they forwarded the complaint to VA for investigation.
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 53, 'start': 14}, {'class': 'ASSETS', 'end': 89, 'start': 78}]",Anonymous has released thousands of login credentials and other data from the web servers of the European Space Agency (ESA) following a breach of several of the agency's Internet domains; did it just to prove it can be done. ;
[],;
"[{'class': 'ACTION', 'end': 10, 'start': 0}]",DNC hacked;
"[{'class': 'ACTION', 'end': 13, 'start': 0}, {'class': 'ACTION', 'end': 66, 'start': 50}, {'class': 'ACTION', 'end': 234, 'start': 228}, {'class': 'ACTOR', 'end': 260, 'start': 249}, {'class': 'ACTION', 'end': 308, 'start': 261}, {'class': 'ACTION', 'end': 408, 'start': 393}, {'class': 'ASSETS', 'end': 417, 'start': 409}]","A data breach at the Wyoming Department of Health publicly exposed COVID-19, influenza and blood alcohol test data from more than a quarter of Wyomingites and some out of state residents, the department announced Tuesday. The breach occurred when an employee erroneously uploaded files containing that data to the public code-hosting platform GitHub. Data for more than 164,000 individuals was uploaded to the site, according to the health department. More than 145,000 people affected are believed to be Wyoming residents who received a COVID-19 or influenza test between January 2020 and March 2021. Blood alcohol test data involved just over 18,000 people, most of whom are Wyoming residents, according to the health department. ;"
"[{'class': 'ACTION', 'end': 59, 'start': 36}, {'class': 'ACTION', 'end': 83, 'start': 70}]","Association of National Advertisers Suffers Phishing Attack, Possible Theft Of Data ;"
"[{'class': 'ACTION', 'end': 5, 'start': 0}, {'class': 'ASSETS', 'end': 27, 'start': 11}, {'class': 'ACTION', 'end': 49, 'start': 28}]",Theft of a desktop computer exposes 3269 records.;
"[{'class': 'ASSETS', 'end': 3, 'start': 0}, {'class': 'ACTION', 'end': 11, 'start': 4}]",ATM Skimmer;
"[{'class': 'ACTION', 'end': 41, 'start': 0}, {'class': 'ACTION', 'end': 52, 'start': 45}]",had their payment card information stolen by hackers in the last several months;
"[{'class': 'ACTOR', 'end': 46, 'start': 25}, {'class': 'ACTION', 'end': 85, 'start': 47}, {'class': 'ACTION', 'end': 106, 'start': 86}, {'class': 'ACTION', 'end': 110, 'start': 108}, {'class': 'ACTION', 'end': 133, 'start': 112}, {'class': 'ACTION', 'end': 155, 'start': 139}, {'class': 'ASSETS', 'end': 172, 'start': 164}, {'class': 'ACTION', 'end': 215, 'start': 178}]","Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;"
"[{'class': 'ASSETS', 'end': 92, 'start': 74}, {'class': 'ACTION', 'end': 108, 'start': 93}, {'class': 'ASSETS', 'end': 287, 'start': 272}, {'class': 'ASSETS', 'end': 425, 'start': 415}]","Rocky Mountain Health Care Services of Colorado Springs has discovered an unencrypted laptop has been stolen from one of its employees. This is the second such incident to be discovered in the space of three months. The latest incident was discovered on September 28. The laptop computer was discovered to contain the protected health information of a limited number of patients. The types of information stored on the device included first and last names, addresses, dates of birth, health insurance information, Medicare numbers, and limited treatment information.;"
"[{'class': 'ACTION', 'end': 73, 'start': 38}, {'class': 'ASSETS', 'end': 90, 'start': 78}, {'class': 'ASSETS', 'end': 102, 'start': 95}, {'class': 'ACTION', 'end': 123, 'start': 103}, {'class': 'ACTION', 'end': 146, 'start': 128}, {'class': 'ASSETS', 'end': 204, 'start': 198}, {'class': 'ACTION', 'end': 233, 'start': 212}]",Emory University System Center Server accidentally sends out a command to all workstations and servers to format themselves and install Windows 7. By the time the error was discovered even the SCCM server itself had formatted itself.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
[],;
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 23, 'start': 10}, {'class': 'ASSETS', 'end': 44, 'start': 24}]",Anonymous breached into the official website of Thailand Senate and Public Health Ministry;
[],;
"[{'class': 'ACTION', 'end': 17, 'start': 0}, {'class': 'ASSETS', 'end': 46, 'start': 39}, {'class': 'ACTION', 'end': 270, 'start': 260}, {'class': 'ACTION', 'end': 401, 'start': 388}, {'class': 'ASSETS', 'end': 433, 'start': 425}]",A security breach on a city of Madison website that exposed 50 Social Security numbers for as long as five years has led the Madison City Clerk's Office to tell everybody who fills out an application there that too much information is not always a good thing. The breach was discovered Dec. 19 when a city employee discovered a Social Security number in a liquor license application that was posted on the city's legislative website.;
"[{'class': 'ACTION', 'end': 69, 'start': 58}, {'class': 'ACTION', 'end': 151, 'start': 141}, {'class': 'ACTION', 'end': 216, 'start': 174}, {'class': 'ACTION', 'end': 512, 'start': 488}, {'class': 'ACTION', 'end': 632, 'start': 608}, {'class': 'ACTION', 'end': 1243, 'start': 1228}]","Bank of America Corp. (NYSE: BAC) has revealed a possible data breach on business clients' information for the Paycheck Protection Program. The breach occurred on April 22, as BofA uploaded PPP applications onto the U.S. Small Business Administration's test platform, according to a filing with the California Attorney General's Office. The limited-access platform allowed lenders to test PPP submissions before the second round began. Charlotte-based BofA said application information may have been visible to other SBA-authorized lenders and their vendors. ""There is no indication that your information was viewed or misused by these lenders or their vendors. And your information was not visible to other business clients applying for loans, or to the public, at any time,"" BofA said. Compromised information could include business details, such as an address or tax identification number, or a business owner's information, such as name, address, Social Security number, phone number, email and citizenship status. Applicants were part of a nationwide pool, with customers in multiple states likely affected. BofA did not specify which states. A spokesperson described it as a ""small number"" of clients. The bank said the data breach did not affect the applications' submission to the SBA. It asked the SBA to remove the visible information that same day, according to the filing. BofA said it also conducted internal investigations. The spokesperson declined to provide further details. The bank is offering a free two-year membership for Experian identify theft protection, which includes daily credit monitoring and surveillance. It did not say how many customers were affected or how many lenders were using the test site on April 22. ;"
"[{'class': 'ACTION', 'end': 31, 'start': 9}, {'class': 'ACTION', 'end': 57, 'start': 48}]","hospital infected by ransomware, likely through phishing.;"
"[{'class': 'ASSETS', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 43, 'start': 9}]",Database breach led to potential disclosure of 300K names and encrypted pw;
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 59, 'start': 9}]",New hire provided login details of former employee's emails;
"[{'class': 'ACTION', 'end': 32, 'start': 13}, {'class': 'ACTION', 'end': 103, 'start': 52}, {'class': 'ACTION', 'end': 299, 'start': 270}, {'class': 'ACTION', 'end': 333, 'start': 304}, {'class': 'ASSETS', 'end': 348, 'start': 339}, {'class': 'ASSETS', 'end': 497, 'start': 490}, {'class': 'ACTOR', 'end': 560, 'start': 540}, {'class': 'ACTOR', 'end': 593, 'start': 562}, {'class': 'ACTOR', 'end': 616, 'start': 599}]","Two patients ran a google search of their names and were able to find their medical information online. Doctors' reports with medications, medical treatments, lab information, future and past treatment plans, physical examination information, and lifestyle information could be downloaded by anyone who found the information online. The documents were from November 2012 through January 2013 and discovered online in mid-March. Portal Healthcare secured the sensitive information on its servers on March 14. A lawsuit was filed against Glens Falls Hospital, Portal Healthcare Solutions LLC, and Carpathia Hosting in mid-April for patient privacy violations.;"
"[{'class': 'ACTOR', 'end': 3, 'start': 0}, {'class': 'ACTION', 'end': 173, 'start': 123}]","AOL releases search histories for 650,000 subscribers. The identifications of the subscribers were not disclosed, but many were identified by analyzing the search histories. ;"
"[{'class': 'ACTOR', 'end': 15, 'start': 0}, {'class': 'ACTION', 'end': 114, 'start': 16}, {'class': 'ACTION', 'end': 206, 'start': 120}]","Chinese hackers break into Google looking for source code, trade secrets, information about human rights activists, and also to identify chinese operatives that were being investigated by the United States.;"
"[{'class': 'ACTOR', 'end': 14, 'start': 0}, {'class': 'ACTION', 'end': 54, 'start': 15}]","internal actor downloaded a trove of company documents about 40 gigabytes over a four-year period, including code;"
"[{'class': 'ACTION', 'end': 47, 'start': 20}, {'class': 'ACTION', 'end': 217, 'start': 202}, {'class': 'ASSETS', 'end': 267, 'start': 258}, {'class': 'ACTOR', 'end': 318, 'start': 309}, {'class': 'ACTION', 'end': 350, 'start': 319}]","The Freepik Company has disclosed a data breach impacting the login information of more than 8 million Freepik and Flaticon users. According to a press release, the security incident was the result of a SQL injection in Flaticon, one of the world’s largest databases of free customizable icons, that allowed attackers to exfiltrate user information.;"
[],Parents disclosed son had CF markers (but not CF) in his genes. Teachers told parents of kids who did have CF about other student.;
"[{'class': 'ASSETS', 'end': 8, 'start': 2}, {'class': 'ACTION', 'end': 60, 'start': 50}]","a camera used to document patient skin conditions was stolen out of a physician's car last June. The photos date back to mid-February, and contain information such as patient names and dates of birth.;"
"[{'class': 'ACTOR', 'end': 11, 'start': 0}, {'class': 'ACTION', 'end': 133, 'start': 103}, {'class': 'ACTION', 'end': 151, 'start': 137}, {'class': 'ASSETS', 'end': 179, 'start': 172}, {'class': 'ACTION', 'end': 214, 'start': 180}, {'class': 'ASSETS', 'end': 226, 'start': 219}, {'class': 'ACTION', 'end': 305, 'start': 288}, {'class': 'ASSETS', 'end': 326, 'start': 319}, {'class': 'ACTION', 'end': 459, 'start': 452}, {'class': 'ACTOR', 'end': 471, 'start': 460}, {'class': 'ACTION', 'end': 531, 'start': 513}]","Cone Health is notifying 2,076 patients of Southeastern Heart and Vascular Center about a very limited breach of patient information. A clerical error resulted in patient letters being sent to the wrong addresses. The letters named the patient, their doctor and the name of the practice they were seeing. None of the letters disclosed social security numbers, dates of birth or insurance information. Patients are being individually notified of the mix up. Cone Health regrets any confusion resulting from the incorrect mailing.;"
"[{'class': 'ACTOR', 'end': 169, 'start': 160}, {'class': 'ASSETS', 'end': 284, 'start': 275}, {'class': 'ACTOR', 'end': 644, 'start': 635}, {'class': 'ACTION', 'end': 1180, 'start': 1157}, {'class': 'ACTION', 'end': 1202, 'start': 1185}, {'class': 'ACTION', 'end': 1249, 'start': 1207}, {'class': 'ACTION', 'end': 1349, 'start': 1344}, {'class': 'ASSETS', 'end': 1538, 'start': 1520}, {'class': 'ASSETS', 'end': 1549, 'start': 1541}, {'class': 'ASSETS', 'end': 1725, 'start': 1717}, {'class': 'ASSETS', 'end': 1745, 'start': 1737}, {'class': 'ASSETS', 'end': 1789, 'start': 1777}, {'class': 'ASSETS', 'end': 1816, 'start': 1800}, {'class': 'ASSETS', 'end': 1938, 'start': 1927}, {'class': 'ASSETS', 'end': 2028, 'start': 2019}, {'class': 'ASSETS', 'end': 2157, 'start': 2149}, {'class': 'ASSETS', 'end': 2276, 'start': 2268}]","For more than two years, the Internet's most popular implementation of the Transport Layer Security (TLS) protocol has contained a critical defect that allowed attackers to pluck passwords, authentication cookies, and other sensitive data out of the private server memory of websites. Ars was among the millions of sites using the OpenSSL library, and that means we too were bitten by this extraordinarily nasty bug. By mid-morning Tuesday, Ars engineers already updated OpenSSL and revoked and replaced our site's old TLS certificate. That effectively plugged the hole created by the vulnerability. By installing the OpenSSL update, attackers could no longer siphon sensitive data out of our server memory. And although there's no evidence the private encryption key for Ars' previous TLS certificate was compromised, the replacement ensured no one could impersonate the site in the event hackers obtained the key. With Ars servers fully updated, it's time to turn our attention to the next phase of recovery. In the hours immediately following the public disclosure of the so-called Heartbleed vulnerability, several readers reported their Ars accounts were hijacked by people who exploited the bug and obtained other readers' account passwords. There's no way of knowing if compromises happened earlier than that. Ars has no evidence such hacks did occur, but two years is a long time. There's simply no way of ruling out the possibility. It's for this reason that Ars strongly recommends all readers change their account passwords. A password change is especially urgent for people who logged in between Monday evening and mid morning on Tuesday. It's also particularly important for anyone who used their Ars password to protect accounts on other sites or anyone whose Ars accounts contained private messages of a sensitive nature. But again, out of an abundance of caution, Ars strongly urges all users to reset their pass codes. As always, security-conscious readers should choose unique, randomly generated passwords at least nine characters long that contain upper- and lower-case letters, numbers, and symbols. For a refresher on good password hygiene, see Ars senior IT reporter Jon Brodkin's The secret to online safety: Lies, random characters, and a password manager.;"
"[{'class': 'ACTION', 'end': 9, 'start': 0}, {'class': 'ASSETS', 'end': 29, 'start': 16}]",unsecured cloud file storage.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 88, 'start': 52}, {'class': 'ASSETS', 'end': 96, 'start': 89}, {'class': 'ASSETS', 'end': 165, 'start': 158}, {'class': 'ASSETS', 'end': 194, 'start': 185}]","A private citizen contacted VA police to report she found a bag on the side of the road. The bag contained personal information that belonged to the owner of the bag (VA physician) and documents that contained Veterans' personally identifiable information (PII) and protected health information (PHI). The list of diabetic patients contained 13 Veterans' full names, age, and full SSN. There was also two appointment lists that contained 14 Veterans' full name, last four digits of the SSN, home phone number. In addition, there was a copy of a PATS report that contained one Veteran's full name and full SSN, one letter from a pharmacy that contained a Veteran's full name and date of birth, one letter from insurance company that contained one Veteran's full name, diagnoses and date of birth.;"
"[{'class': 'ACTION', 'end': 97, 'start': 66}, {'class': 'ACTION', 'end': 126, 'start': 102}, {'class': 'ACTION', 'end': 333, 'start': 318}, {'class': 'ASSETS', 'end': 385, 'start': 366}, {'class': 'ACTION', 'end': 428, 'start': 393}, {'class': 'ASSETS', 'end': 606, 'start': 585}, {'class': 'ASSETS', 'end': 866, 'start': 847}, {'class': 'ASSETS', 'end': 911, 'start': 893}, {'class': 'ASSETS', 'end': 976, 'start': 948}, {'class': 'ACTOR', 'end': 1229, 'start': 1222}, {'class': 'ACTION', 'end': 1281, 'start': 1230}, {'class': 'ACTION', 'end': 1304, 'start': 1286}, {'class': 'ACTION', 'end': 1367, 'start': 1358}, {'class': 'ACTION', 'end': 1592, 'start': 1560}, {'class': 'ASSETS', 'end': 1679, 'start': 1672}, {'class': 'ACTION', 'end': 1723, 'start': 1680}, {'class': 'ACTION', 'end': 1849, 'start': 1815}, {'class': 'ACTION', 'end': 1883, 'start': 1877}, {'class': 'ASSETS', 'end': 1900, 'start': 1892}, {'class': 'ASSETS', 'end': 1948, 'start': 1936}, {'class': 'ASSETS', 'end': 1992, 'start': 1980}, {'class': 'ACTION', 'end': 2091, 'start': 2053}]","A company that sends out SMSes and emails on Nedbank’s behalf may have been hit by a data breach. The “data security incident” may have released the names, ID numbers, telephone numbers, physical and/or email addresses of 1.7 million Nedbank clients. In a statement on Thursday morning, Nedbank said that there was a “data incident” at the direct marketing company Computer Facilities, which sends emails and cellphone messages on its behalf. “No Nedbank systems or client bank accounts have been compromised in any manner whatsoever or are at risk as a result of this data issue at Computer Facilities.” Forensic experts have been appointed to conduct an extensive investigation and the bank is also working with the relevant regulators and authorities, Nedbank CEO Mike Brown said. Nedbank Group Chief Information Officer Fred Swanepoel said Computer Facilities did not have any links to Nedbank’s systems. As a further precautionary measure, Computer Facilities’ systems have been disconnected from the internet until further notice. Clients’ bank accounts are not at risk and they do not need to take any further action other than continuing to be vigilant against attempts at fraud, Nedbank said. Two years ago, hackers seized insurance company Liberty's email repository and demanded a ""ransom"" in exchange for the data. Other incidents included the theft of 60 million South Africans’ personal data via a holding company for several real estate firms including Realty1, ERA and Aida. The personal records of almost 1 million South African drivers were also reportedly compromised through the online traffic fine website ViewFine, while in 2017 Ster-Kinekor's website was also exposed for lacking data security. At the end of last year, many South Africans who view pornography on their mobile phones were affected by a massive breach. A local company reportedly leaked a large database of web browsing history along with mobile-phone identifiers, and in some cases social media usernames, allowing some individuals to be identified – and linked to the pornography they viewed.;"
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 25, 'start': 9}, {'class': 'ASSETS', 'end': 38, 'start': 26}]",employee took pictures of credit cards used for payment;
"[{'class': 'ASSETS', 'end': 10, 'start': 2}, {'class': 'ACTION', 'end': 189, 'start': 179}]","A database within the University of Wisconsin-Madison Law School that contained Social Security numbers and name pairs corresponding with 1,213 Law School applicants for 2005-'06 was hacked last month, the university announced Tuesday.;"
"[{'class': 'ACTION', 'end': 22, 'start': 0}, {'class': 'ASSETS', 'end': 31, 'start': 23}]",exposed elastic search database;
"[{'class': 'ASSETS', 'end': 27, 'start': 20}, {'class': 'ACTION', 'end': 54, 'start': 36}, {'class': 'ACTION', 'end': 77, 'start': 61}]","Popular stock photo service, 123RFm hit by data breach, 8.3M records for sale;"
"[{'class': 'ACTOR', 'end': 19, 'start': 0}, {'class': 'ACTION', 'end': 43, 'start': 20}, {'class': 'ACTION', 'end': 88, 'start': 71}, {'class': 'ASSETS', 'end': 97, 'start': 89}, {'class': 'ACTION', 'end': 150, 'start': 120}]","former fire captain accessed the account of a Wells Fargo customer and issued himself an ATM card in that persons name, then made three withdrawals of $800 each from the account.;"
"[{'class': 'ACTOR', 'end': 4, 'start': 0}, {'class': 'ACTOR', 'end': 27, 'start': 13}, {'class': 'ACTION', 'end': 86, 'start': 60}, {'class': 'ACTION', 'end': 168, 'start': 158}]","Gang called ""Armenian Power"" located in Southern California installed skimming devices in retail chain called .99 cents only stores. Over two million dollars was stolen from a total of a few hundred victims.;"
[],04/17/12:
"[{'class': 'ACTOR', 'end': 31, 'start': 0}, {'class': 'ACTION', 'end': 84, 'start': 32}, {'class': 'ACTION', 'end': 142, 'start': 117}, {'class': 'ASSETS', 'end': 162, 'start': 151}, {'class': 'ACTION', 'end': 168, 'start': 163}, {'class': 'ACTOR', 'end': 413, 'start': 404}, {'class': 'ACTION', 'end': 632, 'start': 576}, {'class': 'ACTION', 'end': 676, 'start': 661}, {'class': 'ACTOR', 'end': 685, 'start': 677}, {'class': 'ACTOR', 'end': 816, 'start': 808}, {'class': 'ASSETS', 'end': 1068, 'start': 1056}, {'class': 'ACTOR', 'end': 1144, 'start': 1132}, {'class': 'ACTION', 'end': 1209, 'start': 1177}, {'class': 'ACTOR', 'end': 1304, 'start': 1301}, {'class': 'ACTOR', 'end': 1466, 'start': 1458}, {'class': 'ACTION', 'end': 1570, 'start': 1537}, {'class': 'ACTOR', 'end': 1665, 'start': 1657}, {'class': 'ACTOR', 'end': 2005, 'start': 1997}, {'class': 'ACTOR', 'end': 2098, 'start': 2095}, {'class': 'ACTOR', 'end': 2262, 'start': 2254}, {'class': 'ACTOR', 'end': 2495, 'start': 2492}, {'class': 'ACTOR', 'end': 2673, 'start': 2665}, {'class': 'ACTOR', 'end': 2817, 'start': 2809}, {'class': 'ACTION', 'end': 2881, 'start': 2855}, {'class': 'ACTOR', 'end': 2943, 'start': 2935}, {'class': 'ACTOR', 'end': 3196, 'start': 3188}, {'class': 'ACTION', 'end': 3858, 'start': 3799}, {'class': 'ACTION', 'end': 3896, 'start': 3860}, {'class': 'ACTOR', 'end': 4371, 'start': 4363}, {'class': 'ACTOR', 'end': 4448, 'start': 4441}, {'class': 'ACTOR', 'end': 4540, 'start': 4532}, {'class': 'ACTION', 'end': 4609, 'start': 4541}, {'class': 'ASSETS', 'end': 4738, 'start': 4733}, {'class': 'ACTION', 'end': 4787, 'start': 4762}, {'class': 'ACTION', 'end': 5078, 'start': 5066}, {'class': 'ACTOR', 'end': 5220, 'start': 5213}]","A Nevada medical lab technician who had previously been convicted for Medicaid fraud has been indicted on charges of committing identity theft tied to credit card fraud while out on parole. Legal experts say the case is a reminder to healthcare entities and their business associates to conduct background checks on prospective employees and take other measures to prevent and detect breaches involving insiders. In an Oct. 28 statement, the U.S. Department of Justice said a federal grand jury on Oct. 27 indicted Sherice Joan Williams, of North Las Vegas, on one count of illegal use and disclosure of patient health information and one count of aggravated identity theft. Williams pleaded not guilty to the charges. The FBI handled the investigation in collaboration with local police. Prosecutors say Williams, between about Dec. 1, 2014, and Jan. 27, 2015, while working as a laboratory technician at an unnamed Las Vegas pediatric cardiology practice, allegedly accessed a patient's information without authorization and then used it to apply for credit cards without the patient's knowledge. Criminal History Previously, Williams was convicted on a felony charge of submitting false Medicaid claims, according to a Nov. 4, 2013, statement from the Nevada's state attorney general's office. She was then sentenced to serve 12 to 48 months in prison and pay about $10,000 in restitution, penalties and costs. In that case, prosecutors alleged that Williams, while working for a North Las Vegas behavioral health services firm, had submitted false documentation for services she never provided to a Medicaid recipient. The investigation found that Williams submitted progress notes and subsequent Medicaid claims for time periods where the Medicaid recipient was not receiving the behavioral health services, according to a statement from the Nevada state attorney general's office. The fraud occurred between February and May 2012. Nevada parole board records indicate that even though Williams was sentenced in November 2013 to serve one to four years for the Medicaid fraud crimes, she was granted parole from a state prison a few weeks later, on Nov. 25, 2013, and then was released from prison on Jan. 22, 2014. Parole was granted because Williams had earned credits while serving another concurrent sentence for a previous fraud-related case, a Nevada parole board spokesman says. Parole records indicate that Williams' parole was subsequently revoked on March 19, 2015, and she is currently serving out her Medicaid fraud sentence, the spokesman says. Crane Pomerantz, assistant U.S. Attorney in the Nevada district who is lead prosecutor in the Williams case, declined to comment on the case or the defendant's previous criminal record, and how that potentially could affect sentencing if Williams is convicted on the new ID theft and criminal HIPAA violations. In a statement, prosecutors note that if convicted, Williams faces up to 10 years in prison on the health information charge and a minimum of two years consecutive on the aggravated identity theft charge, plus maximum fines of $250,000 on each count. Preventive Measures Healthcare fraud experts say the Williams case is a warning to other healthcare entities and business associates about the need to scrutinize prospective and current workforce members. ""In commentary to the HIPAA Security Rule, the Department of Health and Human Services states that 'the need for and extent of a screening process is normally based on an assessment of risk, cost, benefit, and feasibility as well as other protective measures in place,'"" notes privacy attorney Adam Greene of the law firm David Wright Tremaine. ""Organizations may wish to consider what information individuals will have access to, and what is the risk that they will use that information for their own financial gain, such as for identity theft purposes. This may lead to more focused background checks, with more stringent standards applied to workforce members who will have access to Social Security numbers, credit card numbers and other high-risk information."" While background checks can help vet employees, they're not foolproof, notes privacy attorney Kirk Nahra of the law firm Wiley Rein. ""Background checks are important, and healthcare companies should do them generally, but they aren't perfect,"" he says. ""Insider threats are a real and significant issue. In my personal experience, insider problems are far more likely to lead to actual harm than many external breaches."" Insiders with bad intentions can take exactly what they need for bad purposes, Nahra says. ""This is a consistent and ongoing problem,"" he says. As a result, healthcare organizations must educate their staff on the consequences of inappropriate data access and then monitor their activity, he says. ""People have to know they will get caught and that they will get fired,"" he says. ""But it is hard to balance access to data to get your job done with strong controls and an effective monitoring problem."" The recent attention on major cyberattacks in the healthcare sector should not divert organizations from addressing insider threats, Nahra stresses. ""But sometimes the focus on hackers ... distracts from this current, ongoing, significant problem with insider threats."" ;"
"[{'class': 'ACTION', 'end': 5, 'start': 0}, {'class': 'ASSETS', 'end': 35, 'start': 9}, {'class': 'ACTION', 'end': 76, 'start': 36}]",Theft of portable electronic device leads to breach of 2700 patient records.;
"[{'class': 'ASSETS', 'end': 7, 'start': 0}, {'class': 'ACTION', 'end': 39, 'start': 33}, {'class': 'ACTION', 'end': 51, 'start': 44}]",Website of Bangalore City Police Hacked and Defaced;
"[{'class': 'ASSETS', 'end': 35, 'start': 21}, {'class': 'ACTION', 'end': 47, 'start': 36}, {'class': 'ACTOR', 'end': 73, 'start': 51}]",MCG Health had their infrastructure compromised by unknown external actor which impacted 10 hospitals;
"[{'class': 'ACTION', 'end': 169, 'start': 158}, {'class': 'ASSETS', 'end': 202, 'start': 191}, {'class': 'ACTION', 'end': 248, 'start': 223}, {'class': 'ASSETS', 'end': 566, 'start': 543}, {'class': 'ACTION', 'end': 603, 'start': 591}, {'class': 'ACTION', 'end': 643, 'start': 608}, {'class': 'ACTION', 'end': 670, 'start': 645}, {'class': 'ACTION', 'end': 696, 'start': 675}, {'class': 'ASSETS', 'end': 1186, 'start': 1181}, {'class': 'ACTION', 'end': 1231, 'start': 1187}]","More than 5,500 patients of Virginia-based NOVA Chiropractic & Rehab Center of Sterling may have had personal information including Social Security numbers compromised after an unencrypted thumb drive containing the data was possibly thrown away. How many victims? 5,534, according to HHS.gov. What type of personal information? Names, addresses, health records, and, in some cases, Social Security numbers, dates of birth, diagnoses, insurance claim forms, and payment information, including expired credit card data. What happened? An unencrypted thumb drive that contained the data was misfiled and put into regular office circulation, inadvertently wiped clean, or possibly thrown away. What was the response? NOVA is interviewing involved individuals and taking inventory of electronic devices as part of an ongoing investigation. NOVA is improving security by only using encrypted and password protected devices. NOVA has issued a notification that is posted to the website, and is offering a free examination, regular office visit, or therapy session to impacted individuals or their family members. Details: NOVA learned of the incident on Jan. 30. The unencrypted drive was used to transfer older electronic files. Quote: Please rest assured that your health information is intact and our office still has your important records, John Ratcliffe, clinic director with NOVA, wrote in the notification posted online. The likelihood that there indeed was a breach of information is extremely low. Source: sterlingchiropractortherapy.com, Important HIPAA notice, March 25, 2014.;"
"[{'class': 'ACTION', 'end': 103, 'start': 80}, {'class': 'ACTION', 'end': 138, 'start': 115}, {'class': 'ASSETS', 'end': 227, 'start': 221}, {'class': 'ACTION', 'end': 235, 'start': 228}, {'class': 'ACTION', 'end': 377, 'start': 360}, {'class': 'ASSETS', 'end': 438, 'start': 429}, {'class': 'ASSETS', 'end': 645, 'start': 638}, {'class': 'ACTOR', 'end': 731, 'start': 681}, {'class': 'ASSETS', 'end': 780, 'start': 772}, {'class': 'ASSETS', 'end': 792, 'start': 786}, {'class': 'ASSETS', 'end': 916, 'start': 907}, {'class': 'ASSETS', 'end': 1027, 'start': 1021}, {'class': 'ASSETS', 'end': 1130, 'start': 1122}, {'class': 'ASSETS', 'end': 1158, 'start': 1152}, {'class': 'ACTION', 'end': 1461, 'start': 1445}, {'class': 'ACTION', 'end': 1641, 'start': 1634}, {'class': 'ACTION', 'end': 1801, 'start': 1772}, {'class': 'ACTION', 'end': 2102, 'start': 2084}, {'class': 'ACTION', 'end': 2129, 'start': 2113}, {'class': 'ACTOR', 'end': 2155, 'start': 2133}, {'class': 'ACTOR', 'end': 2181, 'start': 2167}, {'class': 'ACTOR', 'end': 2186, 'start': 2183}, {'class': 'ACTOR', 'end': 2222, 'start': 2192}, {'class': 'ACTOR', 'end': 2227, 'start': 2224}, {'class': 'ACTOR', 'end': 2249, 'start': 2229}, {'class': 'ACTOR', 'end': 2280, 'start': 2258}, {'class': 'ACTOR', 'end': 2317, 'start': 2296}, {'class': 'ACTOR', 'end': 2332, 'start': 2325}, {'class': 'ACTION', 'end': 2350, 'start': 2333}, {'class': 'ASSETS', 'end': 2364, 'start': 2353}, {'class': 'ACTION', 'end': 2519, 'start': 2500}, {'class': 'ACTION', 'end': 2566, 'start': 2529}, {'class': 'ACTION', 'end': 2854, 'start': 2796}, {'class': 'ACTOR', 'end': 2991, 'start': 2984}, {'class': 'ACTION', 'end': 3053, 'start': 2992}]","Confidential legal aid details of a Bay man accused of breaching community work were mistakenly sent to a woman in a major privacy breach. The Katikati man's name, address and what his case was about were contained in a letter sent to a Tauranga mother who had applied for legal aid for her daughter. Private details of two other men from outside the region were also sent to the woman about their legal aid applications - the documents relate to legal representation at parole hearings. The woman contacted the Bay of Plenty Times yesterday, speaking on the basis that she was not named. She said she was ""horrified"" to discover the letters among documents sent to her by the Ministry of Justice's Legal Aid Office in Rotorua. The Bay of Plenty Times has sighted the letters. The letter addressed to a Katikati man confirmed his application for legal aid had been granted. The woman who received the documents said she had lodged a legal aid application for her daughter, over a drink-driving case. She learned by letter the application had been declined and put it aside. Last week, she discovered the three other letters. ""If it was just one letter, I probably wouldn't have thought anything more about it but there was three other people's private information and I know if it was me I would want to know my privacy has been breached and someone is held accountable for what's happened. ""I really thought, given all the other recent privacy breaches, government agencies would have upped their game and put in place stricter processes, so things like this don't happen."" The 39-year-old Katikati man at the centre of the blunder said he was ""blown away"" when contacted last night: ""It's come as a huge shock and at the moment I don't know what I can do about the damage this has caused me, but I will be seeking some legal advice, for sure."" The man's lawyer could not be contacted for comment. Porirua-based lawyer Mary More, who represents the other two men, said she would take instructions from her clients before commenting further. The latest case comes after a series of blunders involving privacy breaches by government departments, including Immigration NZ, ACC, the Ministry of Social Development, IRD, Environment Ministry and the Earthquake Commission. Last month an Earthquake Commission claims manager accidentally sent a spreadsheet containing 98,000 claimants' confidential details to an insurance advocate. In October, up to 700 Work and Income self-service kiosks were left unsecured, meaning private information was accessible to anyone who used them. Last night Justice Minister Judith Collins said protection of personal information must be taken seriously: ""We expect all agencies to treat such information carefully and respectfully. However, if someone receives information that is clearly not intended for them, then the appropriate thing to do is to give it back."". Legal Aid Services general manager Michele McCreadie said it appeared a staffer had mistakenly included more than one letter in one envelope. The ministry had been alerted. Labour Party spokeswoman Sue Moroney, also its ACC spokeswoman, said: ""This Government proudly cut back office functions right across the public service and they wonder why privacy breaches and administration mistakes are happening on an almost daily basis."";"
"[{'class': 'ASSETS', 'end': 67, 'start': 59}, {'class': 'ACTION', 'end': 102, 'start': 68}, {'class': 'ASSETS', 'end': 125, 'start': 117}, {'class': 'ACTION', 'end': 205, 'start': 164}, {'class': 'ACTION', 'end': 249, 'start': 207}, {'class': 'ASSETS', 'end': 261, 'start': 250}]","Production of Half-Life 3 has been confirmed after Valve's database briefly became open to the public. Valve's Jira database - which the teams use to track bugs - exposed itself for a short period of time, allowing fans to see what was happening in the system. Users could see various internal development groups currently on the Valve roster, including one marked ""Half-Life 3"".;"
"[{'class': 'ACTOR', 'end': 12, 'start': 0}, {'class': 'ACTION', 'end': 67, 'start': 48}, {'class': 'ACTION', 'end': 121, 'start': 72}, {'class': 'ASSETS', 'end': 180, 'start': 150}]","Sean Caffrey, 25, of Sutton Coldfield, admitted illegally accessing and stealing the ranks, usernames and email addresses of more than 800 users of a military communications system, on June 15 2014.;"
"[{'class': 'ACTION', 'end': 169, 'start': 158}, {'class': 'ACTION', 'end': 215, 'start': 196}, {'class': 'ACTION', 'end': 483, 'start': 464}, {'class': 'ACTION', 'end': 522, 'start': 507}, {'class': 'ACTION', 'end': 551, 'start': 532}, {'class': 'ASSETS', 'end': 574, 'start': 557}, {'class': 'ASSETS', 'end': 661, 'start': 651}, {'class': 'ASSETS', 'end': 777, 'start': 768}, {'class': 'ACTION', 'end': 1722, 'start': 1706}, {'class': 'ACTION', 'end': 1889, 'start': 1866}, {'class': 'ACTION', 'end': 1975, 'start': 1956}]","UC Berkeley officials announced today (Thursday, April 30) that they are sending alert notices to current students and other individuals regarding a computer data breach that may have resulted in unauthorized access to their Social Security numbers or other personal information. There is no evidence that such information has actually been used, but officials are notifying individuals in accordance with California law and so that they can be alert to signs of any possible misuse of their information. The data breach involved unauthorized access to a campus Web server maintained by a unit within UC Berkeley's Division of Equity and Inclusion. The server was used to store information including family financial information submitted by students. This included documents containing Social Security and bank account numbers. Officials sent letters to all affected individuals on April 30. This included about 260 undergraduate students and some former students, as well as about 290 parents and other individuals, generally family members of the notified students. Current students also received emails, sent April 30. Paul Rivers, UC Berkeley's interim chief security officer, emphasized that the campus regrets that this occurred and will be offering those individuals free credit monitoring for a year. They also will receive a resource list to aid them in checking for possible suspicious activity on their accounts. When campus officials learned of the breach on March 14 they immediately removed the server from the network so that it could no longer be accessed. A digital forensics firm was brought in to investigate the matter and determine whether any personally identifiable information was compromised. Once the firm completed that work and confirmed the names of all impacted individuals, the letters were sent. The investigation revealed that the unauthorized access first occurred in December 2014 and that an additional, separate, unauthorized access occurred in February 2015. ;"
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 14, 'start': 10}, {'class': 'ASSETS', 'end': 36, 'start': 18}]",A midwife lost an appointments diary in May which contained details of visits by 78 women to antenatal clinics between January and May this year.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 22, 'start': 9}]",employee stole records;
"[{'class': 'ACTION', 'end': 5, 'start': 0}, {'class': 'ASSETS', 'end': 18, 'start': 9}]",Theft od documents exposes 2828 records.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 17, 'start': 13}, {'class': 'ASSETS', 'end': 34, 'start': 21}, {'class': 'ACTION', 'end': 80, 'start': 35}, {'class': 'ACTOR', 'end': 84, 'start': 81}, {'class': 'ACTION', 'end': 101, 'start': 85}]",The March 20 loss of paper records may have exposed the information of patients. ZDI lost the records of their associate Delta Dental of Pennsylvania.;
"[{'class': 'ACTION', 'end': 18, 'start': 0}, {'class': 'ASSETS', 'end': 30, 'start': 23}, {'class': 'ACTION', 'end': 114, 'start': 89}]",Due to a glitch in the website parents who were signing their children up for healthcare could see the information of other participants. Not known how many people were affected but the article states 'very few'.;
"[{'class': 'ACTION', 'end': 76, 'start': 14}]",Twice in 2014 members were emailed with all their addresses in the CC: field;
"[{'class': 'ACTOR', 'end': 5, 'start': 0}, {'class': 'ACTION', 'end': 42, 'start': 6}, {'class': 'ASSETS', 'end': 51, 'start': 43}]",Human error allowed unauthorized access to database that stored job applicants' PII.;
"[{'class': 'ASSETS', 'end': 65, 'start': 44}, {'class': 'ACTION', 'end': 72, 'start': 66}, {'class': 'ACTION', 'end': 85, 'start': 74}, {'class': 'ASSETS', 'end': 99, 'start': 87}, {'class': 'ACTION', 'end': 268, 'start': 257}, {'class': 'ACTION', 'end': 334, 'start': 313}, {'class': 'ASSETS', 'end': 488, 'start': 450}, {'class': 'ACTION', 'end': 683, 'start': 666}, {'class': 'ASSETS', 'end': 720, 'start': 696}, {'class': 'ACTION', 'end': 763, 'start': 721}, {'class': 'ACTION', 'end': 821, 'start': 765}, {'class': 'ACTION', 'end': 851, 'start': 829}]","Marin Medical Practices Concepts electronic medical record system hacked, ransom paid The computer records of Marin Medical Practice Concepts, a Novato company that provides medical billing and electronic medical records services to many Marin physicians, were hacked on July 26. As a result, some Marin doctors were unable to access their patients' medical records for more than a week. information includes vital signs, limited clinical history, documentation of physical examinations, and any record of the communication between patients and their physician during a visit in that 15 day period. Although no financial or personal patient information was found to be compromised, one of the company's backup systems failed during the data-restoration process; the data loss occurred at the time of the system restore due to a faulty backup system not due to the malware;"
"[{'class': 'ACTOR', 'end': 29, 'start': 0}, {'class': 'ACTION', 'end': 42, 'start': 30}]",partner organization employee looks at PHI;
"[{'class': 'ACTION', 'end': 20, 'start': 0}, {'class': 'ASSETS', 'end': 49, 'start': 42}, {'class': 'ACTION', 'end': 152, 'start': 104}]","Malware installed on the Backcountry Gear website for about three months beginning in late April likely resulted in a compromise of customer information, including payment card data.;"
"[{'class': 'ACTOR', 'end': 15, 'start': 0}, {'class': 'ACTION', 'end': 114, 'start': 16}, {'class': 'ACTION', 'end': 206, 'start': 120}]","Chinese hackers break into Google looking for source code, trade secrets, information about human rights activists, and also to identify chinese operatives that were being investigated by the United States.;"
"[{'class': 'ACTOR', 'end': 21, 'start': 0}, {'class': 'ASSETS', 'end': 207, 'start': 196}, {'class': 'ACTOR', 'end': 280, 'start': 269}, {'class': 'ACTION', 'end': 332, 'start': 281}, {'class': 'ACTOR', 'end': 690, 'start': 679}, {'class': 'ACTOR', 'end': 709, 'start': 700}, {'class': 'ACTOR', 'end': 1055, 'start': 1040}, {'class': 'ACTOR', 'end': 1133, 'start': 1124}, {'class': 'ACTION', 'end': 1383, 'start': 1353}, {'class': 'ASSETS', 'end': 1417, 'start': 1409}, {'class': 'ACTION', 'end': 1451, 'start': 1422}, {'class': 'ACTOR', 'end': 1558, 'start': 1547}, {'class': 'ACTION', 'end': 1586, 'start': 1559}, {'class': 'ACTOR', 'end': 1859, 'start': 1850}, {'class': 'ACTION', 'end': 1871, 'start': 1860}, {'class': 'ASSETS', 'end': 2174, 'start': 2163}, {'class': 'ACTION', 'end': 2201, 'start': 2193}, {'class': 'ACTOR', 'end': 2217, 'start': 2202}]","Anonymous hacktivists have initiated a campaign called OpLastResort, a new operation that comes in response to the death of Reddit co-founder Aaron Swartz. The first target of this operation is the website of the United States Sentencing Commission (ussc.gov), which the hackers defaced to display their message of protest against the US government and the justice system. Two weeks ago today, a line was crossed. Two weeks ago today, Aaron Swartz was killed. Killed because he faced an impossible choice. Killed because he was forced into playing a game he could not win -- a twisted and distorted perversion of justice -- a game where the only winning move was not to play, the hackers stated. Anonymous immediately convened an emergency council to discuss our response to this tragedy. After much heavy-hearted discussion, the decision was upheld to engage the United States Department of Justice and its associated executive branches in a game of a similar nature, a game in which the only winning move is not to play, they added. The hacktivists admitted that the FBI had managed to infiltrate certain elements of Anonymous last year. They say that these infiltrations have resulted in disproportionate prosecutions. However, now theyre determined to show the FBI that it hasn't managed to cripple their infrastructure and demoralize them. They claim to have infiltrated several government-owned websites and obtained valuable information, including the details of a number of warheads. As part of this first phase of OpLastResort, the hackers have published some details of one warhead which is allegedly primed and armed. We have not taken this action lightly, nor without consideration of the possible consequences. Should we be forced to reveal the trigger-key to this warhead, we understand that there will be collateral damage, Anonymous threatened. We appreciate that many who work within the justice system believe in those principles that it has lost, corrupted, or abandoned, that they do not bear the full responsibility for the damages caused by their occupation. It is our hope that this warhead need never be detonated. Currently, the website of the USSC still displays the hacktivists' protest message.;"
"[{'class': 'ACTION', 'end': 15, 'start': 0}, {'class': 'ASSETS', 'end': 22, 'start': 19}, {'class': 'ACTION', 'end': 51, 'start': 23}]",Skimming device on ATM leads to payment card theft.;
"[{'class': 'ACTION', 'end': 85, 'start': 49}, {'class': 'ASSETS', 'end': 103, 'start': 86}, {'class': 'ASSETS', 'end': 269, 'start': 262}, {'class': 'ASSETS', 'end': 465, 'start': 456}, {'class': 'ASSETS', 'end': 558, 'start': 552}, {'class': 'ACTION', 'end': 579, 'start': 559}, {'class': 'ASSETS', 'end': 860, 'start': 850}, {'class': 'ACTION', 'end': 882, 'start': 861}]","On May 16, a researcher discovered that 1to1Help was exposing data in a misconfigured Amazon s3 bucket. When they eventually had time to look at the data, they found that were were more than 300,000 records with personal and sensitive information in the exposed bucket. The researcher then contacted this site to share their findings. Beginning on June 10, DataBreaches.net attempted to notify 1to1Help.net of the exposure so that they could secure their database. Emails sent to the site on June 10 and June 11 received no reply and by June 18, the bucket was still unsecured. An India-based cybersecurity firm that has assisted this site in the past in making notifications in India, BanBreach, also attempted to reach out to the firm, but did not reach anyone. After yet another week went by with no response from 1to1Help.net and finding that the bucket was still not secured, DataBreaches.net decided to start contacting some of 1to1Help’s larger corporate clients, hoping that if their clients called them to say, “Hey, our data is exposed,” they’d get action. On June 26, I spoke with a top privacy official for the U.S. headquarters of one of the multinational firms affected by the 1to1Help leak and explained the situation to her. I also started reaching out via email to other large corporate clients of 1to1Help.net. Two of the firms were immediately responsive and indicated that they were reaching out to 1to1Help.net On July 14, I finally got a response from Anil Bisht, the Director of 1to1Help.net.;"
"[{'class': 'ACTOR', 'end': 21, 'start': 3}, {'class': 'ACTION', 'end': 38, 'start': 22}, {'class': 'ASSETS', 'end': 59, 'start': 51}, {'class': 'ASSETS', 'end': 67, 'start': 60}, {'class': 'ASSETS', 'end': 94, 'start': 86}, {'class': 'ACTOR', 'end': 169, 'start': 150}, {'class': 'ACTION', 'end': 191, 'start': 170}, {'class': 'ACTION', 'end': 209, 'start': 192}, {'class': 'ASSETS', 'end': 376, 'start': 368}, {'class': 'ACTOR', 'end': 461, 'start': 455}, {'class': 'ACTION', 'end': 508, 'start': 478}]","An unauthorized peson gained access to part of our computer network that supports the websites we operate. Based on the investigation, we believe an unauthorized person may have been able to acquire a copy of the email addresses and account password, as well as the last four digits and expiration of the credit card used by the individuals who have logged in to the websites we operate. Although we do not store passwords in plain text, we believe the person has the ability to convert them to plain text.;"
"[{'class': 'ACTION', 'end': 44, 'start': 20}, {'class': 'ACTION', 'end': 136, 'start': 98}, {'class': 'ACTION', 'end': 167, 'start': 138}, {'class': 'ACTOR', 'end': 223, 'start': 208}, {'class': 'ASSETS', 'end': 358, 'start': 355}]","Patient information was supposed to be faxed to a health care facility for patient treatment, but was inadvertently faxed to a business. (The wrong area code was used.) An owner at the business contacted the Privacy Officer immediately to report the receipt of the information. The owner agreed to destroy the information appropriately (delete electronic fax). The owner had previously worked in the healthcare industry and was very agreeable and willing to take appropriate action.;"
"[{'class': 'ACTION', 'end': 10, 'start': 0}]",Ransomware on school not successful;
"[{'class': 'ACTION', 'end': 147, 'start': 91}, {'class': 'ACTOR', 'end': 569, 'start': 547}, {'class': 'ACTION', 'end': 616, 'start': 600}, {'class': 'ACTOR', 'end': 659, 'start': 651}, {'class': 'ACTION', 'end': 1804, 'start': 1775}, {'class': 'ACTOR', 'end': 2000, 'start': 1994}, {'class': 'ACTOR', 'end': 2146, 'start': 2140}, {'class': 'ACTION', 'end': 2222, 'start': 2190}, {'class': 'ACTOR', 'end': 2273, 'start': 2259}, {'class': 'ACTION', 'end': 2329, 'start': 2305}, {'class': 'ACTOR', 'end': 2339, 'start': 2331}, {'class': 'ACTION', 'end': 2390, 'start': 2378}, {'class': 'ACTOR', 'end': 2768, 'start': 2759}, {'class': 'ACTOR', 'end': 2778, 'start': 2770}, {'class': 'ACTOR', 'end': 2903, 'start': 2896}, {'class': 'ACTION', 'end': 2922, 'start': 2904}, {'class': 'ACTION', 'end': 3180, 'start': 3152}, {'class': 'ACTION', 'end': 3254, 'start': 3228}, {'class': 'ACTOR', 'end': 3414, 'start': 3406}, {'class': 'ACTOR', 'end': 3476, 'start': 3469}, {'class': 'ACTOR', 'end': 3485, 'start': 3478}, {'class': 'ACTOR', 'end': 3619, 'start': 3597}, {'class': 'ACTOR', 'end': 3630, 'start': 3625}]","A hospital patient who stuck pencils in her eyes in a suicide attempt, then found out that a photo of her self-mutilation turned up on the Internet three years later, has agreed to settle the part of her lawsuit against Los Angeles County and one of its nurses, her attorney said Wednesday. Douglas Johnson, who represents the 24-year-old plaintiff, told Los Angeles Superior Court Judge Elizabeth Allen White that the proposed resolution would remove the county and nurse Shannon Lipham as defendants in the case. The case will proceed against nurse Kristin Ciasulli, who the plaintiff accuses of taking the photo at County-USC Medical Center, and Ciasulli's then- employer, HRN Services Inc., Johnson said. Johnson declined to state the amount of the settlement, but noted it would be public information if the Board of Supervisors approves it. He praised the county's lawyers for working with him toward a resolution of the case, which was filed in October 2014 and identifies the plaintiff only as Jane Doe. ""I absolutely think it was the right thing to do and I was impressed with the compassion they showed for my client,"" Johnson said. During today's hearing, the judge said Johnson needs to shore up only one of the four allegations against HRN Services intentional infliction of emotional distress. Johnson said the problem with the complaint can be easily fixed. The attorney also said he was pleased that the judge found the details behind the other three allegations negligent infliction of emotional distress, intrusion upon seclusion and negligent training, supervision and retention of an employee were sufficient, and that White rejected a defense argument that his client didn't have an expectation of privacy in the large emergency room where her unauthorized photo was taken. According to the complaint, the woman was admitted to the county-run hospital in June 2011 after trying to kill herself by thrusting pencils into her eyes. She survived, but was blinded. Lipham was a relief pool nurse employed by the county who also was assigned to care for the plaintiff, according to Doe's court papers, which say Lipham acknowledged in a June deposition that she sent the photograph to her niece, who in turn gave it to a man named Joshua Shivers, who the plaintiff's attorneys allege posted the photo. Ciasulli admitted during a deposition that she took a photo of the injured plaintiff and says she did so as a ""teaching tool."" She says she later deleted the image and that it was not the photo that turned up on the Internet. Up to a half-dozen other medical workers took similar images of the plaintiff when the injured La Canada Flintridge resident was brought into the County-USC Medical Center emergency room, according to Ciasulli. Ciasulli worked at the time for HRN Services, which supplies hospitals with temporary and supplemental healthcare employees. Shivers uploaded the image in July 2014 onto ""one of the most visited shock websites in the world,"" the suit says. The same day, he took credit for his actions on a social networking site, saying, ""I finally made it in life. Please check out my shiz,"" and included a link to the photo, according to the complaint. A week later, he placed the same photo onto a ""popular entertainment and social media website,"" according to the plaintiff's attorney, who says it has received more than 192,000 Internet views. Ciasulli said she did not send a copy of the photo she took to Lipham. Shivers in deposition testimony said he didn't know how the photo he posted was taken, but said it was given to him by Alexis Brennecke Siwek, the niece of a nurse at the hospital.;"
"[{'class': 'ASSETS', 'end': 7, 'start': 0}, {'class': 'ACTION', 'end': 16, 'start': 8}, {'class': 'ACTION', 'end': 74, 'start': 21}]",Website breached and customer data (including credit card numbers) stolen.;
"[{'class': 'ACTION', 'end': 10, 'start': 0}]",XSS attack on Uber poll.;
"[{'class': 'ASSETS', 'end': 15, 'start': 7}, {'class': 'ACTION', 'end': 28, 'start': 16}, {'class': 'ACTION', 'end': 57, 'start': 46}]",School networks brought down for 1 day due to DoS attack.;
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 40, 'start': 10}, {'class': 'ACTOR', 'end': 104, 'start': 90}, {'class': 'ACTION', 'end': 151, 'start': 108}]",Anonymous publishes five encrypted files that purportedly contain classified information. Activist group is threatening to publish the encryption keys.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ASSETS', 'end': 30, 'start': 24}, {'class': 'ACTION', 'end': 81, 'start': 65}, {'class': 'ASSETS', 'end': 88, 'start': 82}, {'class': 'ASSETS', 'end': 138, 'start': 128}, {'class': 'ACTOR', 'end': 202, 'start': 182}, {'class': 'ASSETS', 'end': 215, 'start': 209}, {'class': 'ACTION', 'end': 228, 'start': 216}]","Customer returns faulty laptop and receives new one. Sainsbury's sells the faulty laptop on Ebay, apparently without wiping the hard drive (which was supposed to have been done by a 3rd party contractor). The laptop is purchased, and the buyer contacts the original owner to let them know their profile and personal info is still on the system.;"
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTOR', 'end': 15, 'start': 0}, {'class': 'ACTION', 'end': 56, 'start': 16}]",Former employee took sensitive data upon leaving company;
"[{'class': 'ASSETS', 'end': 19, 'start': 0}, {'class': 'ACTION', 'end': 66, 'start': 57}, {'class': 'ASSETS', 'end': 77, 'start': 67}]",Portable hard drive that contained sensitive information was lost. Hard drive was not protected by full disk encryption or a password.;
"[{'class': 'ACTOR', 'end': 5, 'start': 0}, {'class': 'ACTION', 'end': 53, 'start': 6}, {'class': 'ASSETS', 'end': 73, 'start': 57}, {'class': 'ACTION', 'end': 93, 'start': 83}, {'class': 'ACTION', 'end': 157, 'start': 136}, {'class': 'ACTOR', 'end': 161, 'start': 159}, {'class': 'ACTION', 'end': 183, 'start': 167}, {'class': 'ACTION', 'end': 238, 'start': 189}, {'class': 'ACTION', 'end': 287, 'start': 256}, {'class': 'ASSETS', 'end': 329, 'start': 313}, {'class': 'ACTION', 'end': 368, 'start': 330}, {'class': 'ACTION', 'end': 399, 'start': 373}]",A man guessed or accessed the Social Security numbers of Macy's customers in order to exploit a Macy's policy for the purpose of making fraudulent purchases. He then created ID cards that paired his picture with the customer information. A Macy's policy allowed him to charge purchases to the accounts of other Macy's customers by using their Social Security numbers and showing his falsified IDs. ;
"[{'class': 'ACTION', 'end': 134, 'start': 78}, {'class': 'ACTION', 'end': 345, 'start': 300}, {'class': 'ACTOR', 'end': 462, 'start': 457}, {'class': 'ACTION', 'end': 678, 'start': 638}, {'class': 'ACTION', 'end': 717, 'start': 683}, {'class': 'ASSETS', 'end': 865, 'start': 849}, {'class': 'ACTION', 'end': 918, 'start': 895}]","The Johnson City School System faced a similar situation in February when the wrong personal information cards were inadvertently sent home with Woodland Elementary School students. Debra Bentley, the systems supervisor of instruction and communication, said some students in six classes at Woodland were sent home with the wrong emergency cards, which can include students addresses, home telephone numbers and Social Security numbers. The principal asked staff to send students emergency contact cards home in the childrens communication folders, hoping parents would review them and send corrections or updates back to the school, but some cards were put in the wrong folders and went home with the wrong students. The administration later offered to pay for one-year subscriptions to LifeLocks services for each family affected.. Read more: Personal records of all Elizabethton students accidentally emailed to parent | Johnson City Press http://www.johnsoncitypress.com/article/118907/personal-records-of-all-elizabethton-students-accidentally-emailed-to-parent#ixzz3D6VV4VAQ Follow us: @JCPress on Twitter | JohnsonCityPress on Facebook;"
"[{'class': 'ASSETS', 'end': 8, 'start': 0}]",Database without security controls found by security researcher.;
"[{'class': 'ACTOR', 'end': 94, 'start': 84}, {'class': 'ACTION', 'end': 149, 'start': 95}, {'class': 'ACTOR', 'end': 206, 'start': 186}, {'class': 'ACTION', 'end': 247, 'start': 207}]","Veteran/Employee requested a sensitive record report because he believes one of his co-workers might be inappropriately accessing his medical record. Sensitive Record Report showed that employee in question did access the complainant's CPRS record on one occasion July 30, 2010.;"
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ASSETS', 'end': 3, 'start': 0}, {'class': 'ACTION', 'end': 12, 'start': 4}]",ATM skimmers;
"[{'class': 'ACTION', 'end': 54, 'start': 25}, {'class': 'ACTOR', 'end': 84, 'start': 55}]",Mille Lacs Health System email accounts were access by unauthorized external parties;
"[{'class': 'ACTION', 'end': 16, 'start': 0}]",Publishing error;
"[{'class': 'ACTION', 'end': 6, 'start': 0}, {'class': 'ASSETS', 'end': 13, 'start': 7}]",Stolen laptop;
"[{'class': 'ASSETS', 'end': 19, 'start': 10}, {'class': 'ACTION', 'end': 63, 'start': 20}, {'class': 'ASSETS', 'end': 73, 'start': 64}, {'class': 'ACTION', 'end': 108, 'start': 74}]",Sensitive documents were left outside unattended during a move. Documents were taken and presented to press.;
"[{'class': 'ACTION', 'end': 44, 'start': 38}, {'class': 'ACTOR', 'end': 74, 'start': 55}, {'class': 'ACTION', 'end': 115, 'start': 75}]",SEIU 775 Benefits Group experienced a breach when some unknown third party started deleted information of customers;
"[{'class': 'ASSETS', 'end': 30, 'start': 23}, {'class': 'ACTION', 'end': 50, 'start': 40}, {'class': 'ACTOR', 'end': 75, 'start': 68}, {'class': 'ACTION', 'end': 87, 'start': 76}, {'class': 'ASSETS', 'end': 127, 'start': 120}, {'class': 'ACTION', 'end': 143, 'start': 133}, {'class': 'ACTION', 'end': 205, 'start': 197}, {'class': 'ACTION', 'end': 214, 'start': 207}]","Illinois Public Health Website Hit With Ransomware Amid Coronavirus Hackers infected an Illinois Public Health provider website with ransomware during the coronavirus pandemic; Maze Team exploits, phishing, malware, and a PACS incident complete this week’s breach roundup.;"
"[{'class': 'ACTION', 'end': 154, 'start': 133}, {'class': 'ASSETS', 'end': 167, 'start': 162}, {'class': 'ACTION', 'end': 410, 'start': 361}, {'class': 'ACTION', 'end': 421, 'start': 415}, {'class': 'ASSETS', 'end': 452, 'start': 445}, {'class': 'ASSETS', 'end': 549, 'start': 543}, {'class': 'ASSETS', 'end': 640, 'start': 635}, {'class': 'ASSETS', 'end': 1158, 'start': 1153}, {'class': 'ACTOR', 'end': 1348, 'start': 1327}, {'class': 'ACTION', 'end': 1361, 'start': 1349}, {'class': 'ASSETS', 'end': 1370, 'start': 1364}, {'class': 'ASSETS', 'end': 1459, 'start': 1448}, {'class': 'ACTION', 'end': 1477, 'start': 1460}, {'class': 'ACTION', 'end': 1498, 'start': 1487}, {'class': 'ACTOR', 'end': 2188, 'start': 2184}, {'class': 'ACTION', 'end': 2483, 'start': 2475}, {'class': 'ASSETS', 'end': 2555, 'start': 2546}]","The Surgeon General on Monday issued a warning to his staff that is all too familiar to federal employees: Your personal information may have been stolen. In an email, Surgeon General Vice Adm. Vivek H. Murthy told ""commissioned corps"" employees of the Public Health Service that information, including their names, dates of birth and Social Security numbers, ""may have been accessed by unauthenticated users"" who hacked the agency's personnel system. ""Based on our investigation, affected individuals are those served by this website-based system: current, retired, and former Commissioned Corps officers and their dependents,"" the email said. The commissioned corps is a cadre of about 6,600 medical professionals including physicians, nurses, dentists, rehabilitation therapists, pharmacists, researchers and more reporting to the Surgeon General. They are involved in health-care delivery to underserved and vulnerable populations, disease control and prevention, food and drug regulation, and disaster response. Counting retirees, former employees and family members would bring the total of affected people much higher, although neither the email nor a spokesman for the Department of Health and Human Services, the parent agency of the PHS, specified a figure. The spokesman said the agency learned Sept. 20 that unauthenticated users could access a system used for payroll, leave, time, attendance and other personnel functions. The portal site has been disabled and will remain down while the investigation continues, although the Sept. 30 payroll run was unaffected, the email said. ""Teams across the Department and across government are working to learn as much as we can as quickly as we can, and to further improve our systems to prevent this type of issue in the future. . . . Next steps could include offering identity protection services to affected individuals,"" said the email, co-signed by HHS Acting Assistant Secretary for Health Karen B. DeSalvo. The email promises further information as it becomes available and offers instructions on how to request a free credit report and how to report unusual activity or potential errors on a credit report. The hack is the latest in a long line of breaches of federal employee records that have targeted individual agencies, including the Energy Department and the U.S. Postal Service, as well as the Thrift Savings Plan, the 401(k)-style retirement savings program for federal employees. The largest breaches, involving about 22 million people combined, hit two separate databases of the Office of Personnel Management. Those involved personnel records of current and former federal employees plus persons on whom the government had conducted background investigations, for security clearance or other reasons, since about 2000. That resulted in a widespread offer of free credit monitoring and identity theft protection services for employees, and the creation of a new office to oversee background checks, along with boosted cyberdefenses.;"
"[{'class': 'ACTION', 'end': 137, 'start': 129}, {'class': 'ASSETS', 'end': 224, 'start': 211}]","The Arkansas Department of Finance and Administration, Employee Benefits Division reported that 7,039 employees were affected by a breach at Health Advantage that occurred in October 2012. The incident involved paper records, and Health Advantage separately reported the breach as affecting 2,863. In addition to Arkansas DFA, Baptist Health System in Arkansas reported that 811 of their patients were affected by the incident.;"
"[{'class': 'ACTOR', 'end': 46, 'start': 25}, {'class': 'ACTION', 'end': 85, 'start': 47}, {'class': 'ACTION', 'end': 110, 'start': 108}, {'class': 'ACTION', 'end': 133, 'start': 112}, {'class': 'ACTION', 'end': 155, 'start': 139}, {'class': 'ASSETS', 'end': 172, 'start': 164}, {'class': 'ACTION', 'end': 215, 'start': 178}]","Incident associated with Red October campaign. Phishing email with malware attachment leading to infection, C2, credential compromise, and lateral movement through network. Goal to steal classified info and secrets.;"
"[{'class': 'ACTION', 'end': 75, 'start': 17}, {'class': 'ASSETS', 'end': 139, 'start': 130}, {'class': 'ACTION', 'end': 167, 'start': 140}, {'class': 'ASSETS', 'end': 228, 'start': 219}]","Eleven patients' medical records/documentation were found inside unoccupied ""flu tents"" located in the front of the building. The documents were found by a VA employee who went in to retrieve furniture left inside. The documents contained the 11 patients' names, social security numbers, dates of birth, and medical information.;"
"[{'class': 'ACTION', 'end': 36, 'start': 9}, {'class': 'ACTOR', 'end': 46, 'start': 37}]","300,000+ Accounts and details leaked by 0xOmar from Israeli Ministry of Construction and Housing.;"
"[{'class': 'ACTION', 'end': 23, 'start': 0}]",unauthorized release of an electronic copy of all 2015 W2s;
"[{'class': 'ACTOR', 'end': 14, 'start': 0}, {'class': 'ACTION', 'end': 35, 'start': 26}, {'class': 'ASSETS', 'end': 61, 'start': 36}]",Hospital staff sacked for prying on patients’ medical records in Suffolk and Colchester hospitals;
"[{'class': 'ACTOR', 'end': 25, 'start': 2}, {'class': 'ACTOR', 'end': 45, 'start': 27}, {'class': 'ASSETS', 'end': 123, 'start': 115}, {'class': 'ACTION', 'end': 170, 'start': 124}, {'class': 'ACTOR', 'end': 200, 'start': 194}, {'class': 'ACTOR', 'end': 412, 'start': 398}]","A Headland police officer, Jason Carey Hughes, pleaded guilty in 2009 to using the Law Enforcement Tactical System database to look up the criminal background of a minor. Court records indicate Hughes believed the minor raped one of his relatives. If the minor was ever tried or convicted of rape, there's no publicly available court record of it. After Hughes was kicked off the police force, the former officer was also convicted of drug distribution.;"
"[{'class': 'ACTION', 'end': 37, 'start': 10}, {'class': 'ACTOR', 'end': 251, 'start': 240}]","Veteran A received correspondence for Veteran B who has the same first & last name. The correspondence included the name, date of birth, social security number, home mailing address and telephone number. Veteran A returned the documents to the clinic.;"
"[{'class': 'ACTION', 'end': 49, 'start': 11}]",University mailing reveals patient treatment info - University of Wisconsin-Madison;
[],third party module updated;
"[{'class': 'ACTION', 'end': 32, 'start': 24}, {'class': 'ASSETS', 'end': 44, 'start': 33}]",Telangana: Man held for skimming debit cards - Heart Cup Café;
"[{'class': 'ACTOR', 'end': 14, 'start': 0}, {'class': 'ACTOR', 'end': 37, 'start': 15}, {'class': 'ACTOR', 'end': 52, 'start': 42}, {'class': 'ACTION', 'end': 77, 'start': 71}, {'class': 'ASSETS', 'end': 111, 'start': 103}]",Indian Hackers Harsha Vardhan Boppana and Codie Root claimed that they hacked into Stanford university website. ;
"[{'class': 'ACTOR', 'end': 10, 'start': 0}, {'class': 'ACTION', 'end': 38, 'start': 11}]",Employee A accessed the medical record of a veteran without a need to know outside their normal duties.;
"[{'class': 'ACTION', 'end': 69, 'start': 10}, {'class': 'ACTION', 'end': 221, 'start': 181}]",Veteran A was sent a hemocult slide test with Veteran B's information on a label from a VA employee. Veteran A called to report that the label did not contain their information but had another Veteran's information on it.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 31, 'start': 7}, {'class': 'ACTION', 'end': 45, 'start': 33}]",MOVEit vulnerability exploited. Data stolen.;
"[{'class': 'ACTION', 'end': 174, 'start': 122}, {'class': 'ACTOR', 'end': 531, 'start': 524}, {'class': 'ACTION', 'end': 554, 'start': 532}, {'class': 'ASSETS', 'end': 587, 'start': 579}]","The letter sent out to customers doesn't specify what happened. It only notes that certain Experian consumer information ""may have been accessed without proper authorization."" The data includes names, addresses, social security numbers, dates of birth and account numbers. Experian is working with Defense Contracts South and law enforcement on investigating the incident. Experian is providing two years of complementary credit monitoring and report through the company's ProtectMyID Elite product. DataBreaches believes someone might have compromised Defense Contracts South database login credentials. It's also worth noting that Experian doesn't usually offer complementary enrollment in the ProtectMyID service. This means that the company has either changed its incident response plan, or this breach is more serious than it appears to be.;"
"[{'class': 'ACTOR', 'end': 11, 'start': 0}, {'class': 'ACTION', 'end': 35, 'start': 12}, {'class': 'ASSETS', 'end': 104, 'start': 90}]",An employee posted a Patient's name and what ward they were staying on at the VA on their Facebook page.;
"[{'class': 'ACTOR', 'end': 9, 'start': 0}, {'class': 'ACTION', 'end': 92, 'start': 10}]","Attackers broke into cable television and Internet service provider and cut cables servicing 160,000 homes.;"
"[{'class': 'ACTION', 'end': 50, 'start': 0}]",Patient data accidentally faxed to a news station.;
"[{'class': 'ACTOR', 'end': 8, 'start': 0}, {'class': 'ACTION', 'end': 41, 'start': 9}]",Employee provided data to former employee;
"[{'class': 'ACTOR', 'end': 32, 'start': 18}, {'class': 'ACTION', 'end': 109, 'start': 55}, {'class': 'ACTOR', 'end': 234, 'start': 221}, {'class': 'ACTOR', 'end': 303, 'start': 292}, {'class': 'ACTION', 'end': 346, 'start': 304}, {'class': 'ACTOR', 'end': 383, 'start': 379}, {'class': 'ACTION', 'end': 422, 'start': 384}, {'class': 'ASSETS', 'end': 459, 'start': 432}, {'class': 'ACTION', 'end': 492, 'start': 464}, {'class': 'ACTOR', 'end': 542, 'start': 538}, {'class': 'ACTION', 'end': 625, 'start': 570}, {'class': 'ASSETS', 'end': 649, 'start': 626}, {'class': 'ACTION', 'end': 762, 'start': 700}, {'class': 'ASSETS', 'end': 896, 'start': 892}, {'class': 'ACTION', 'end': 907, 'start': 897}]","TAIPEI, Taiwan -- A male suspect was arrested on May 1 for hacking into a popular local classic music website, the Criminal Investigation Bureau (CIB) announced yesterday. The police raided the apartment of the suspect, surnamed Shih (_), and seized his computer. Investigators allege that the suspect used the computer in his hacking attempts. During initial investigations, Shih confessed to the police that he hacked into the website's customer database and made unauthorized changes to customer data, the CIB said in a statement. Shih also confessed that he has used a hacking technique called SQL injection to attack the website's database. SQL injection is a code injection technique that exploits a security vulnerability in an application's software, the CIB said. The investigation was launched by the bureau after it received a report from the website's operator who said its site was hacked in March. The CIB urged local website operators to stay on alert regarding similar hacking attempts.;"
"[{'class': 'ACTOR', 'end': 21, 'start': 13}, {'class': 'ACTION', 'end': 40, 'start': 22}, {'class': 'ASSETS', 'end': 49, 'start': 44}, {'class': 'ACTION', 'end': 92, 'start': 61}, {'class': 'ACTION', 'end': 160, 'start': 99}, {'class': 'ACTION', 'end': 191, 'start': 162}, {'class': 'ACTION', 'end': 221, 'start': 200}]","An Alto city employee unknowingly opened an email attachment to download the alleged invoice, when a virus “grabbed files inside the computer and encrypted them, saying we had to pay a ransom of $500 to get our files back;"
"[{'class': 'ACTOR', 'end': 42, 'start': 33}, {'class': 'ACTION', 'end': 72, 'start': 43}]",A VHA employee complained that a co-worker accessed his sensitive record based on a copy of Access Log Report. 10/18/11:
[],;
"[{'class': 'ASSETS', 'end': 15, 'start': 7}, {'class': 'ACTION', 'end': 28, 'start': 16}, {'class': 'ACTION', 'end': 57, 'start': 46}]",School networks brought down for 1 day due to DoS attack.;
"[{'class': 'ACTION', 'end': 68, 'start': 54}]",Camberwell High School becomes second target of major privacy breach in two weeks;
"[{'class': 'ACTOR', 'end': 7, 'start': 0}, {'class': 'ACTION', 'end': 25, 'start': 8}]",Scammer obtains W-2 forms of Monarch Beverage employees;
"[{'class': 'ACTOR', 'end': 31, 'start': 13}, {'class': 'ASSETS', 'end': 150, 'start': 142}, {'class': 'ACTOR', 'end': 230, 'start': 222}, {'class': 'ACTION', 'end': 379, 'start': 362}, {'class': 'ACTOR', 'end': 389, 'start': 381}, {'class': 'ASSETS', 'end': 423, 'start': 416}, {'class': 'ACTION', 'end': 477, 'start': 424}, {'class': 'ACTION', 'end': 571, 'start': 487}, {'class': 'ACTION', 'end': 612, 'start': 582}, {'class': 'ACTION', 'end': 646, 'start': 614}, {'class': 'ACTOR', 'end': 722, 'start': 714}]","Navy veteran Sylvester Woodland said he couldnt believe what he was seeing Wednesday night when he logged onto the Veteran Affairs E-Benefits website. It gave me a different persons name, each and every time I came back, Woodland said. At first I thought it was just a glitch, but the more I thought about it, I said, wait a minute, this is more than a glitch, this is a breach. Woodland was on the VAs E-Benefits website trying to track down his own history for a bank loan. Instead, windows kept popping up displaying other veterans medical and financial information. When you click on these hyperlinks here, it takes you to the bank account, the direct deposit, bank account, last four, what bank is it for, Woodland said. Ill bet he has no idea that Im sitting here in my house with his information.;"
"[{'class': 'ACTOR', 'end': 32, 'start': 25}, {'class': 'ACTION', 'end': 97, 'start': 82}, {'class': 'ACTION', 'end': 368, 'start': 318}, {'class': 'ACTION', 'end': 429, 'start': 384}, {'class': 'ASSETS', 'end': 452, 'start': 437}, {'class': 'ACTION', 'end': 464, 'start': 458}, {'class': 'ACTOR', 'end': 496, 'start': 491}, {'class': 'ACTOR', 'end': 529, 'start': 515}, {'class': 'ACTOR', 'end': 540, 'start': 535}, {'class': 'ASSETS', 'end': 618, 'start': 611}, {'class': 'ACTION', 'end': 663, 'start': 624}]","Different victim for the sunshop campaign We recently identified another targeted attack campaign that leveraged both the recently announced Internet Explorer zero-day, CVE-2013-1347, as well as recently patched Java exploits CVE-2013-2423 and CVE-2013-1493. This campaign appears to have affected a number of victims based on the use of the Internet Explorer zero-day as well as the amount of traffic observed at making requests to the exploit server. This attack was likely executed by an actor we have named the Sunshop Group. This actor was also responsible for the 2010 compromise of the Nobel Peace Prize website that leverage a zero-day in Mozilla Firefox.;"
"[{'class': 'ASSETS', 'end': 13, 'start': 0}, {'class': 'ACTION', 'end': 44, 'start': 14}]",Point of Sale compromise leads to capture of restuarant's customers' payment card information. ;
"[{'class': 'ACTOR', 'end': 20, 'start': 2}, {'class': 'ACTOR', 'end': 49, 'start': 30}, {'class': 'ACTOR', 'end': 176, 'start': 171}, {'class': 'ACTION', 'end': 231, 'start': 206}, {'class': 'ACTOR', 'end': 243, 'start': 236}, {'class': 'ACTION', 'end': 299, 'start': 273}, {'class': 'ACTOR', 'end': 375, 'start': 370}, {'class': 'ACTOR', 'end': 444, 'start': 437}, {'class': 'ACTOR', 'end': 613, 'start': 606}, {'class': 'ACTOR', 'end': 652, 'start': 647}, {'class': 'ACTOR', 'end': 729, 'start': 722}, {'class': 'ACTION', 'end': 784, 'start': 730}, {'class': 'ACTION', 'end': 815, 'start': 796}, {'class': 'ACTION', 'end': 850, 'start': 820}, {'class': 'ACTOR', 'end': 886, 'start': 879}, {'class': 'ACTOR', 'end': 896, 'start': 891}, {'class': 'ACTION', 'end': 923, 'start': 897}, {'class': 'ACTION', 'end': 1021, 'start': 1000}, {'class': 'ACTOR', 'end': 1053, 'start': 1048}, {'class': 'ACTION', 'end': 1103, 'start': 1065}, {'class': 'ACTOR', 'end': 1110, 'start': 1105}, {'class': 'ACTION', 'end': 1137, 'start': 1111}, {'class': 'ACTION', 'end': 1192, 'start': 1142}, {'class': 'ACTOR', 'end': 1279, 'start': 1272}, {'class': 'ACTOR', 'end': 1290, 'start': 1284}]"," Nina Monique Allen, 32, and Wendy Marie Johnson, 38, both of Dillon, have been sentenced in federal court in Florence, according to United States Attorney Bill Nettles. Allen previously pleaded guilty to Theft of Government Funds and Johnson previously pleaded guilty to Aggravated Identity Theft. United States District Judge R. Bryan Harwell of Florence, sentenced Allen to five months imprisonment and 3 years supervised release. Johnson was sentenced to 24 months imprisonment and three years supervised release. They were both ordered to pay $26,059.55 in restitution. Evidence established that Johnson worked preparing tax returns and Allen worked as an office manager for EZ Loan and Tax Services in Dillon. Johnson used personal information obtained from former clients of EZ Loan to file tax returns and obtain refunds electronically. Upon receiving the refund, Johnson and Allen would apply a small refund as a credit for loan payments on existing EZ Loan customer's accounts, then issue a ""change check"" in someone else's name. Allen would then recruit people to cash the new checks. Allen recruited nine individuals who were paid between $20 and $200 to cash the checks. The balances of approximately $30,000 received from the IRS was split between Johnson and Allen. ;"
"[{'class': 'ASSETS', 'end': 27, 'start': 21}, {'class': 'ASSETS', 'end': 49, 'start': 44}, {'class': 'ACTION', 'end': 86, 'start': 50}, {'class': 'ASSETS', 'end': 104, 'start': 99}, {'class': 'ACTION', 'end': 276, 'start': 251}, {'class': 'ACTION', 'end': 291, 'start': 280}]","On April, 1, 2013, a laptop and ten patient files were stolen during a car break - in. The patient files were subsequently recovered. However, information regarding some patients of Orthopedic Physician Associates , a division of Proliance Surgeons, may have been compromised by this theft. Sensitive information, including name, address, telephone number, social security number, name of provider, health insurance information and the reason for the patient’s appointment was included in emails stored in the laptop’s cache file. ;"
"[{'class': 'ACTION', 'end': 134, 'start': 107}, {'class': 'ASSETS', 'end': 159, 'start': 140}, {'class': 'ACTION', 'end': 189, 'start': 161}, {'class': 'ACTOR', 'end': 269, 'start': 218}, {'class': 'ACTOR', 'end': 280, 'start': 270}, {'class': 'ASSETS', 'end': 306, 'start': 294}, {'class': 'ACTOR', 'end': 552, 'start': 542}, {'class': 'ACTION', 'end': 595, 'start': 558}, {'class': 'ASSETS', 'end': 1592, 'start': 1578}, {'class': 'ASSETS', 'end': 1645, 'start': 1628}, {'class': 'ACTOR', 'end': 1745, 'start': 1738}, {'class': 'ASSETS', 'end': 1790, 'start': 1772}, {'class': 'ASSETS', 'end': 1909, 'start': 1904}, {'class': 'ACTOR', 'end': 1936, 'start': 1929}, {'class': 'ACTION', 'end': 1993, 'start': 1966}, {'class': 'ACTOR', 'end': 2044, 'start': 2034}, {'class': 'ACTOR', 'end': 2084, 'start': 2074}]","Adobe said Wednesday it is investigating the release of 230 names, email addresses and encrypted passwords claimed to have been stolen from a company database. The information was released on Tuesday on Pastebin by a self-proclaimed Egyptian hacker named ""ViruS_HimA."" The hacker, who claimed the database accessed holds more than 150,000 records, posted links to several websites hosting a text file with 230 records. ""We have seen the claim and are investigating,"" said Wiebke Lips, senior manager with Adobe's corporate communications. The hacker only released records with email addresses ending in ""adobe.com,"" "".mil"" and "".gov."" A look at the 230 records showed the full names, titles, organizations, email addresses, usernames and encrypted passwords of users in a variety of U.S. government agencies, including the departments of Transportation and Homeland Security, the U.S. State Department, the Federal Aviation Administration and state-level agencies, among others. The published passwords are MD5 hashes, or cryptographic representations, of the actual plain-text passwords. It's a good security practice to only store hashes rather than the plain-text passwords, but those hashes can be converted back to their original state using free password-cracking tools and enough computing power. Shorter passwords are easier to crack, especially if they contain no special characters and are, for example, just a word composed of lower-case letters. Many MD5 hashes that have already been reversed are available in lists freely available on the internet. Some of the MD5 hashes released in the text file revealed simple passwords. That's particularly dangerous given that people tend to reuse passwords for other services. Hackers will typically try to use stolen credentials on sites such as Facebook and Twitter to see if they're valid. Given that the data released on Tuesday includes names and organizations, hackers could act fast in an attempt to steal other information. An email request for an interview with ViruS_HimA wasn't immediately returned. The hacker wrote there's another data leak soon to be released from Yahoo. ;"
"[{'class': 'ACTOR', 'end': 34, 'start': 0}, {'class': 'ACTION', 'end': 51, 'start': 35}]","activist Turkish Ajan hacker group pulled data from pizza hut in spain, personal information and credentials, released publicly, no details.;"
"[{'class': 'ACTION', 'end': 96, 'start': 68}, {'class': 'ACTOR', 'end': 123, 'start': 100}, {'class': 'ACTOR', 'end': 229, 'start': 220}, {'class': 'ACTION', 'end': 246, 'start': 230}, {'class': 'ASSETS', 'end': 275, 'start': 267}, {'class': 'ACTOR', 'end': 347, 'start': 338}, {'class': 'ACTION', 'end': 378, 'start': 348}]","We only recently were alerted that our Company was the victim of an illegal data security attack by sophisticated criminals between the dates of June 30 and July 4, 2013. Based on our ongoing review, we believe that the attackers gained access to the Ouidad customer database, compromising your Ouidad account information. It appears the attackers obtained or viewed information about one or more transactions you completed at Ouidad.com.;"
"[{'class': 'ACTOR', 'end': 30, 'start': 0}, {'class': 'ACTION', 'end': 150, 'start': 101}]",A medical marijuana dispensary is conducting an investigation into how sensitive patient information ended up in a pile of trash on a public sidewalk.;