October 28, 2024
Data Breach Alert: National Public Data Compromised
In September 2024, National Public Data confirmed a significant data breach that compromised the personal records of millions of individuals. The exposed information includes names, email addresses, mailing addresses, phone numbers, and even Social Security numbers of up to 2.9 billion people. Here's what you need to know:
What Happened?
National Public Data, a consumer data broker specializing in criminal records, background checks, and other data services for private investigators, consumer public record sites, human resources, staffing agencies, the government, and more, was hacked. The breach is believed to have started in December 2023 when a third-party bad actor attempted to gain access.
In April, a cybercriminal known as "USDoD" posted the stolen data online in a popular criminal community. On August 6, the dataset resurfaced, this time posted for free on several breach forums, making it accessible to anyone.
The exposed data includes names, addresses, phone numbers, email addresses, and Social Security numbers for millions of people, including some deceased individuals. The data also contained previous addresses and, in some cases, alternate names.
While the official data breach notice filed in Maine indicated that 1.3 million records might have been breached, some lawsuits suggest that up to 2.9 billion records have been exposed.
As the investigation continues, many cyber experts are finding inaccuracies in the released data. Aside from the Social Security numbers, most of the information is already public and easily accessible online.
Why Is This Breach Dangerous?
Despite much of the information being publicly available, having it all in one place makes it easier for criminals to misuse it. They can apply for credit cards, loans, or open new bank accounts using the compiled data.
Information such as childhood street names or the last four digits of your Social Security number can often answer security questions, helping hackers bypass authentication and access private accounts.
Some cyber experts predict a surge in phishing and smishing (phishing via SMS) attacks as a result.
Can You Be Affected Even If You've Never Heard of National Public Data?
Yes. Even if you haven't interacted with National Public Data, other organizations, businesses, landlords, etc., may have used their services to gather information about you.
How to Protect Yourself
Step 1: Check if Your Data Has Been Exposed
Use tools like NPD Pentester to see if your information has been compromised. If it has, take immediate action.
Step 2: Request a Copy of Your Credit Report and Freeze Your Credit
One of the best ways to protect your identity is to freeze your credit and set up alerts. This prevents criminals from opening new lines of credit in your name. Contact all three major credit bureaus—Equifax, TransUnion, and Experian—to request a freeze. The process is free and should take less than 10 minutes per site. If others in your household are over 18, consider freezing their credit as well. Anyone with a Social Security number is vulnerable following a breach of this size.
Once you have a copy of your free credit report, review it for any unauthorized activity. Set up alerts and review your credit regularly.
Step 3: Watch Out for Phishing Scams
Many cybercriminals will try to leverage this information to scam you through phone calls, text messages, emails, and even social media sites. Be cautious and vigilant!
A data breach is devastating for everyone involved - the
business hacked and the customers or employees whose data is leaked. As a
business owner, it is your responsibility to make sure you are taking the
highest precautions to protect your business and its data. If you want to do a
full assessment and find out if any of your information has been leaked or if
your network is vulnerable to a breach, we'll do a FREE consult. This deep dive into your network will provide you with a blueprint
for security steps to take. To book yours, call our office at 859-245-0582 or click here.