January Ransomware Attack on BBS Financial Included Data Breach

Date:

November 13, 2024

World map

On November 11, 2024, BBS Financial, LLC filed a notice of data breach with the Maine Attorney General after discovering a ransomware attack that compromised sensitive consumer data.  

According to BBS, an unauthorized party accessed information, including names, addresses, dates of birth, government-issued IDs, Social Security numbers, and financial account details.

Following a thorough investigation, BBS began notifying affected individuals of the breach, JDSupra reports.

The incident traces back to January 29, 2024, when BBS first detected unauthorized access to its computer systems and discovered that data had been removed. The attackers demanded a ransom, threatening to release the information if BBS did not comply.  

BBS responded by shutting down its systems, enlisting third-party cybersecurity experts, and negotiating with the attackers. After paying the ransom, BBS received evidence that the stolen data was deleted, though it remains uncertain whether it could still be misused.

In the aftermath, BBS reviewed compromised files to identify affected consumers and the specific data involved, which could include health insurance information and billing codes.  

Breach notification letters were sent to all impacted individuals, providing details about the compromised information, with the latest letters mailed on November 11, 2024.

Takeaway: Ransomware attacks have evolved to routinely include data exfiltration prior to deploying encryption, escalating the risks beyond just system inaccessibility.

The exfiltrated data is commonly leveraged by attackers to pressure organizations into paying ransoms, especially when victims believe they can restore systems independently. However, paying a ransom provides no real guarantee that the stolen data will not be used in further attacks or exposed in the future—a critical point that organizations often overlook.

When attackers exfiltrate sensitive data, it usually includes information that is subject to custodial responsibility, due care, and regulatory oversight. This sensitive data, if disclosed, can lead to significant legal repercussions, including potential class-action lawsuits and regulatory fines.

If the exfiltrated information includes regulated data, such as financial, health, or proprietary business information, organizations could face both legal liability and enforcement actions from regulatory bodies.

Conducting thorough digital forensics and incident response (DFIR) investigations to understand the full scope of a breach is an extensive process. In some cases, it may take months—or even years—for a victim organization to fully assess what data was compromised.

This extended timeline leaves substantial room for unauthorized parties to misuse the stolen data, jeopardizing confidential information like customer data, intellectual property, and strategic business plans.

Complicating matters is the recent Securities and Exchange Commission (SEC) mandate, which, as of December 2023, requires publicly traded companies to report any "material security event" within four days. The SEC’s fast-track disclosure rule aims for transparency but places companies under pressure to provide detailed incident information before investigations are complete.

This can lead to incomplete disclosures, forcing leadership to release fragmented updates that may erode public trust and expose the company to regulatory fines and investor lawsuits.

This complex regulatory environment compounds the already challenging task of defending against ransomware and data extortion attacks. Organizational leaders, especially the Chief Information Security Officer (CISO), now face increased risks—not only from ransomware operators, but also from the legal and regulatory consequences of delayed or inadequate incident reporting.

Halcyon.ai eliminates the business impact of ransomware, drastically reduces downtime, prevents data exfiltration, and enables organizations to quickly and easily recover from attacks without paying ransoms or relying on backups – talk to a Halcyon expert today to find out more. Halcyon also publishes a quarterly RaaS and extortion group reference guide, Power Rankings: Ransomware Malicious Quartile.