Premium ADs

  • The Port of Seattle dispatched notification letters to those impacted by the August 2024 ransomware attack.
  • Approximately 90,000 individuals received the letter.
  • The assault was carried out by the Rhysida ransomware group.

The Port of Seattle, which manages the city’s seaport and airport under U.S. governmental oversight, has started distributing data breach notification letters to individuals impacted by the incident in August 2024. ransomware The attack exposed that approximately 90,000 individuals were impacted.

“The Port of Seattle today announced that notification letters have been mailed to individuals whose data was impacted in the August 2024 cyberattack ," the firm stated on its website.

This website announcement aims to offer the same details provided in the notification letters sent to people whose contact information with the Port is either inadequate or outdated.

Keep an eye on your credit score from TransUnion for as little as $29.95 per month.

TransUnion offers a credit surveillance solution designed to keep tabs on your fiscal well-being. Featuring instant notifications, ongoing credit scoring, and safeguards against identity fraud, this service guarantees you won’t overlook crucial updates. Access an adjustable web platform providing transparent views of your credit status. Additionally, companies can leverage TransUnion’s sophisticated analytics for evaluating risks effectively.

Preferred partner ( What does this mean? ) View Deal

Rhysida blamed

The Port of Seattle stated in the correspondence that they experienced a cybersecurity incident on August 24, 2024. Following an investigation into this breach, it was found that the intruders "gained access to and extracted certain individual details" stored within their systems. This included outdated frameworks typically utilized for managing employee records, contractor files, as well as parking-related information.

"The Port contains minimal data regarding airport or maritime travelers, and the payment-processing systems remained unaffected," it added.

The collected data primarily belonged to present and past employees and contractors of the Port and similar entities. It encompassed complete names, birthdates, Social Security numbers (or at least their final four digits), as well as driver’s licenses or other governmental identification numbers, alongside personal health details.

The agency informed approximately 90,000 people about the incident, with roughly 71,000 coming from Washington state.

The correspondence also verifies that the Rhysida ransomware group was responsible for the attack. Despite the fact that the perpetrators requested compensation in return for unlocking the systems and erasing the pilfered information, the Port opted against making the payment.

The Port of Seattle stated that we declined to meet the ransom demand, which could lead the actors to release information they assert was obtained through theft onto their dark web platform.

One of the larger ransomware groups active is Rhysida, which has taken credit for attacking institutions such as the British Library, the Chilean Army, Insomniac Games, and numerous others.

Via BleepingComputer

You might also like

  • Large-scale Europcar data leak impacts approximately 200,000 clients.
  • We've rounded up the best password managers
  • Check out our guide to the best authenticator app

Enjoying this article? To discover more stories like this one, follow us on MSN by tapping the +Follow button at the top of the page.

Table of Contents [Close]
    Previous Post Next Post
    X
    X
    X