Incident Report

Massive Leak of 2.7B National Public Data Records

By

Matt Berns, Threat Intelligence Analyst

By

Access Point Consulting

In one of the most significant data breaches in recent history, nearly 2.7 billion records containing sensitive personal information have been allegedly leaked on a popular hacking forum. The data was supposedly obtained from National Public Data (NPD), a US-based data broker. NPD collects and sells personal information for various lawful purposes, including background checks and criminal record searches. A threat actor known as "SXUL" is said to be responsible for the breach, the data was initially offered for sale by a different group called "USDoD.” The leak has sparked widespread concern over the potential for identity theft and fraud, leading to at least four class-action lawsuits against NPD. The company has yet to confirm the breach or provide guidance to those affected, further exacerbating the situation.

Inadequate Security Measures

The breach is believed to have occurred due to inadequate security measures at National Public Data, where the data was stored without encryption, making it easily accessible to anyone with unauthorized access. The compromised data, totaling nearly 2.7 billion records, was first offered for sale by a group known as "USDoD" in April 2024, who claimed to have obtained personal data for 2.9 billion people across the US, Canada, and the UK. The data was later leaked for free by another threat actor, "Fenice," who claimed responsibility for the breach. The repository storing the personal data was compromised, allowing the attackers to exfiltrate the information and subsequently put it up for sale on the dark web.

The first indications of the breach emerged when large files containing personal data were shared on hacking forums. Individuals who reviewed the data confirmed its legitimacy, which prompted a deeper investigation into the source of the leak. The fact that the data was leaked in multiple stages by different threat actors further complicated the situation, making it difficult to trace the exact timeline of the breach.

Impact of the Breach

The breach has had a profound impact, not only on National Public Data but also on the millions of individuals whose information was exposed. The leaked data includes names, Social Security numbers, addresses, and online monikers. At least four class-action lawsuits have already been filed against NPD, with plaintiffs arguing that the breach has exposed them to a heightened risk of identity theft and fraud. The compromised data, although partially outdated, still poses a significant risk to individuals, as even old information can be used for malicious purposes.

The breach involved the compromise of sensitive personal data rather than critical infrastructure systems. However, the leak's scale and the information's sensitivity make this breach particularly damaging. The lack of encryption and the ease with which the data was accessed highlight serious deficiencies in NPD’s data protection practices.

Damage Control Efforts

To date, National Public Data has not publicly detailed its response actions, and the widespread availability of the leaked data suggests that initial containment efforts were either delayed or ineffective. The company has not confirmed the breach or provided guidance to those affected, leaving many individuals unsure of how to protect themselves from potential fraud or identity theft.

The apparent lack of a coordinated response from National Public Data suggests that the company’s incident response plan may have been inadequate or not properly implemented.

Effective incident response requires immediate action to contain the breach, assess the damage, and communicate with stakeholders. The company’s failure to address the breach promptly and transparently has likely exacerbated the situation, leading to increased scrutiny and potential legal consequences.

There has been no public disclosure of any ransom demands or negotiations related to this breach. However, the initial attempt to sell the stolen data for $3.5 million by the group "USDoD" highlights the value of the information and the motivations behind such breaches. The fact that the data was later leaked for free suggests that the attackers may have shifted their strategy, possibly due to the lack of a willing buyer.

Recommendations for NPD

In response to the breach, National Public Data must prioritize the implementation of stronger security measures to prevent future incidents. This includes encrypting all sensitive data, both at rest and in transit, to ensure that even if data is exfiltrated, it remains unreadable to unauthorized parties. The company should also enforce strict access controls, limiting access to sensitive information based on the principle of least privilege. Multi-factor authentication should be implemented across the organization to further protect against unauthorized access. Regular security audits and penetration testing should be conducted to identify and address vulnerabilities in the network’s infrastructure.

The breach serves as a stark reminder of the evolving threat landscape and the importance of proactive cybersecurity measures. National Public Data and other organizations in similar industries must recognize that the risks associated with data breaches are ever-present and continuously adapt their security practices to mitigate these risks. Lessons learned from this incident should inform future security practices, including the need for real-time monitoring, rapid response capabilities, and transparent communication during a breach. Organizations must also invest in ongoing cybersecurity training for employees to ensure that they are equipped to identify and respond to potential threats.

Protecting Your Organization

To prevent similar incidents, organizations must prioritize the implementation of comprehensive data security protocols:

  • Implement full disk encryption on all storage devices to ensure that data is protected even if the physical device is lost or stolen. Use strong encryption algorithms such as AES-256.
  • Encrypt sensitive data stored in databases using field-level encryption. Ensure that encryption keys are stored separately from the encrypted data to prevent unauthorized access.
  • Encrypt individual files or directories containing sensitive data, especially on shared drives and cloud storage. Tools like BitLocker, VeraCrypt, or native cloud encryption features can be used.
  • Ensure that all backup data is encrypted, both during transit to backup locations and while stored. Use encryption keys managed securely and independently of the backup data.

Additionally, strict access controls should be established, limiting access to sensitive information to authorized personnel only. Multi-factor authentication should be mandatory across the organization to prevent unauthorized access. Regular security audits and vulnerability assessments are essential to identify and address potential weaknesses in an organization’s infrastructure.

Resources

Trending Articles & Security Reports

Resources

CyberWatch

November 22, 2024

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

On this episode of the CyberWatch podcast, there are updates to software across the application and OS spectrum. New malicious campaigns are threatening victims of all sizes, and researchers have performed dissections on malware to give defenders new clues about just what it is they're fighting. All this today, in CyberWatch.

Find out more
October 25, 2024

Ransomware, Supply Chain Attacks, and Nation-State Threats

CyberWatch, by Access Point Consulting, is your weekly source for emerging cybersecurity news, regulatory updates, and threat intelligence. Backed by experts in security consulting, regulatory compliance, and security operations, Access Point enables you to manage cyber risks, respond to incidents, and drive innovation in your company. Read here or on our website; listen on Spotify or Apple Podcasts; or watch on YouTube.website; listen on Spotify or Apple Podcasts; or watch on YouTube. .

Find out more
October 7, 2024

VINs and Losses: How Hackers Take Kias for a Ride

In the age of smart cars and connected devices, convenience often comes with hidden risks. A recently discovered critical vulnerability in Kia vehicles serves as a stark reminder of how our increasingly digital world is making cars new targets for cyberattacks. This vulnerability allowed hackers to remotely control various vehicle functions—using nothing more than a car's license plate number. It highlights the growing threat of cyberattacks on connected cars and the importance of cybersecurity in the automotive industry.

Find out more