Cybercriminals were busy in 2023 as data breaches reached new U.S. record

CareSource, Premier Health, Mercy Health all impacted
Data breaches broke the previous record in 2023, according to the Identity Theft Resource Center's annual report. The non-profit group tracks publicly reported breaches and assists people who have been victims.

Credit: Contributed by ITRC

Credit: Contributed by ITRC

Data breaches broke the previous record in 2023, according to the Identity Theft Resource Center's annual report. The non-profit group tracks publicly reported breaches and assists people who have been victims.

There were more data breaches and other compromises of personal information and consumer data in 2023 in the U.S. than ever before, impacting local companies like CareSource, Premier Health and Mercy Health in some of the largest breaches, according to the new annual report from the Identity Theft Resource Center

There were 3,205 data compromises in 2023, impacting 353 million total victims, a figure that includes people who appear in more than one publicly-reported data breach notice, according to the resource center, a non-profit that tracks publicly reported incidents of compromised personal information and consumer data in the U.S. and offers online assistance for people with questions about identity theft, email phishing, scams, data breaches and other cybercrime issues.

“2023 was a watershed year for publicly reported data compromises, ironically during the 20th anniversary of the first data breach law,” said James E. Lee, chief operating officer of the resource center. “In fact, there were more data breaches caused by cyberattacks last year, 2,365, than the previous record for all types of compromises in a single year, (which was) 1,860 in 2021.”

One of the largest data compromises in 2023 involved the cyberattack on MOVEit, a file transfer software tool owned by Progress Software, that impacted a wide variety of companies and organizations, including Dayton-based CareSource and Premier Health.

As of Thursday the resource center had identified 1,417 organizations or companies impacted by the MOVEit breach, with an estimated 72.7 million victims.

Clients and customers of CareSource and Premier Heath whose information was possibly compromised were notified and offered credit monitoring. Both local companies are among multiple companies being sued in federal court over the MOVEit breach.

The new CareSource building located at First and Jefferson Streets in Dayton. MARSHALL GORBY\STAFF

Credit:

icon to expand image

Credit:

Late last year Mercy Health, which operates the Springfield Regional Medical Center, announced a different breach, which involved hospital system vendor Perry Johnson & Associates, Inc.

CareSource spokesman Joe Kelley, Premier Health spokesman Ben Sutherly and Mercy Health spokeswoman Maureen Richmond all declined comment. But Sutherly provided a document from hospital system vendor Welltok, Inc., of Denver, detailing the breach of Welltok’s MOVEit transfer server and its effort to notify impacted individuals.

Richmond provided a document from Perry Johnson & Associates, Inc. indicating that the Henderson, Nevada-based company had alerted people whose information was compromised.

T-Mobile data compromise tops list

The company with the most victims impacted by a data compromise in 2023 was T-Mobile, with 37 million people, followed by Xfinity, with 35.9 million, the report said.

PeopleConnect, Inc. ranked third with 20.2 million victims, and Nationstar Mortgage LLC, doing business as Mr. Cooper, was fourth, with 14.7 million people impacted.

Two companies using MOVEit, PBI Research Services and Maximus, Inc., ranked fifth and eighth respectively, with a combined 22.8 million victims impacted, the report said..

The Perry Johnson & Associates breach impacted 9 million people and ranked ninth.

The health care industry had the most compromises in 2023, followed by financial services, professional services, manufacturing and education, the report said.

Lee said the number of breach notices that did not have actionable information “to help businesses and individuals prepare for similar attacks also grew in 2023, when less than half of cyberattack-related notices included information about what caused the breach.”

While there typically is never just one reason that data breaches increase, Lee said there were several trends in 2023 that help explain the jump in cases.

“Many professional cybercriminals supported by nation/states resumed stealing business and personal information after being more focused on the conflict between Russia and Ukraine,” said Lee. “Professional cybercriminals and nation/state actors focused more on finding and exploiting zero day software flaws.”

In 2023 there were 110 publicly reported zero day attacks, which occur when cybercriminals exploit software flaws that are known but not yet patched. In 2022 there were eight, the report said.

Data compromises like the hack of MOVEit are known as supply chain attacks.

James E. Lee, chief operating officer at the Identity Theft Resource Center

Credit: Contributed

icon to expand image

Credit: Contributed

“Cybercriminals are focusing more on supply chains where attacks against a single, less well-defended vendor can give an attacker access to the data of many companies,” Lee said. “(And) generative artificial intelligence is making phishing attacks and social engineering schemes more effective and more successful.”

What are data compromises?

Data compromises include breaches, exposures and leaks.

Nearly all of the compromises in 2023 were data breaches, which impacted 349 million victims.

Breaches are when unauthorized people remove personal information from where it is stored. It sometimes occurs through ransomware attacks, when hackers use malicious software to infect a computer network and demand money from the victim.

Breaches can compromise personal information like Social Security numbers, logins and passwords, credit card numbers, consumer information, and in some cases also expose company data to the cyber intruders.

Two of the data compromises in 2023 were leaks impacting 2.7 million victims. Leaks are instances when information people have put online is scraped from a website. That occurred in past years on the Facebook and LinkedIn social media platforms, according to the center.

Exposures, typically caused by a system or human error, are generally considered lower risk because there is no indication information was accessed, copied or removed. The center found 25 data exposures that put the information of 960,700 people at risk.

Cyberattacks remain the top cause of data compromises, accounting for the vast majority over the past five years, the report said.

While data compromises have increased dramatically, the number of annual victims has declined since 2018, when there were 2.2 billion victims, and 2017, when there were 1.8 billion, according to the center.

Some of the most prominent data compromises those years occurred at Equifax, Starwood Hotels/Marriott International, River City Media, Google, Facebook, Orbitz, T-Mobile, Verizon, and Uber Technologies Inc., according to Lee.

The resource center advocates stronger federal rules to bolster the patchwork of breach notification laws on the books in every state, U.S. territory and the District of Columbia.

California was the first state to require notification, passing a law in 2003 primarily aimed at what was at risk at the time, personal information stored in filing cabinets, thrown in the trash and on computer disks and drives, the report said.

Eva Velasquez, president and CEO of Identity Theft Resource Center

icon to expand image

The resource center calls for a uniform definition of personally identifiable information that would trigger a mandatory data breach notice, require that state and federal agencies be notified within 24 hours and that potentially impacted individuals be notified within 72 hours after that.

“The two-decade old legislative and regulatory framework designed to alert consumers to breaches is broken,” said Eva Velasquez, CEO of the resource center. “Businesses under or non-report breaches. We need to bring a level of uniformity to the breach notice process to help protect both consumers and business.”

Cybersecurity best practices for companies
Train employees in cybersecurity awareness
Install firewall and anti-virus software
Replace out-of-date equipment and software
Immediately install security patches and updates
Do frequent and duplicative backups
Have a written cyberattack response plan
Install a virtual private network
Scan emails before they go to employees
Change passwords frequently
Use multi-factor authentication

Follow @LynnHulseyDDN on Facebook, Instagram and X.

About the Author