home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,300 of 2,445   
   Mike Powell to All   
   Over 1.6 million customer   
   17 Apr 25 17:17:00   
   
   TZUTC: -0500   
   MSGID: 1033.consprcy@1:2320/105 2c66b81c   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Over 1.6 million customers now hit in massive insurance data breach - how to   
   check if you're one of them   
      
   Date:   
   Thu, 17 Apr 2025 11:27:10 +0000   
      
   Description:   
   Initial reports said around 800,000 individuals were affected, but real    
   number is now thought to be double that.   
      
   FULL STORY   
      
   More than 1.6 million people are now thought to have been affected by the May   
   2024 cyberattack at Landmark Admin, twice as many as originally thought.    
      
   The company confirmed the news in an updated report filed with the Office of   
   the Maine Attorney General.    
      
   The forensic investigation determined that data was encrypted and exfiltrated   
   from Landmarks system, the company said. However, there was insufficient   
   evidence available to identify which files had been compromised. The   
   unauthorized activity occurred between May 13, 2024, and June 17, 2024.    
      
   Landmark Admin is a third-party administrator (TPA) specializing in   
   administrative support services for life insurance and annuity companies.    
      
   In late October 2024, the company reported suffering a serious ransomware   
   attack in which threat actors also stole sensitive customer data, with the   
   attack allegedly the work of a ransomware operator called Abyss.    
      
   Following the breach, Landmark Admin shut down its IT systems and remote   
   access to its network to contain the effects, and brought in third-party   
   security experts, who found the personal information of 806,519 people had   
   been stolen.    
      
   In a data breach notification letter sent to affected customers, Landmark   
   Admin said that the information stolen included peoples full names,    
   addresses, Social Security numbers, tax identification numbers, drivers   
   license numbers, state-issued ID card numbers, passport numbers, financial   
   account numbers, medical information, dates of birth, health insurance policy   
   numbers, and life annuity policy information.    
      
   The information stolen varied from individual to individual, and since the   
   information stolen is highly sensitive, users were advised to be extra   
   vigilant for potential phishing attacks, social engineering, or possible wire   
   fraud.    
      
   At the time of the breach, Landmark offered credit monitoring and identity   
   theft protection services through IDX, including 12 months of credit and   
   CyberScan monitoring, a $1,000,000 insurance reimbursement policy, and fully   
   managed ID theft recovery services.    
      
    Via BleepingComputer   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/over-1-6-million-customers-now-hit-in-m   
   assive-insurance-data-breach-how-to-check-if-youre-one-of-them   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca