Back to Data Breach

Data Breach

North Carolina water supplier falls victim to a cyberattack.

On January 24, 2020, a water supplier in Greenville, North Carolina revealed that its utility services had been compromised in a security incident. Spokesperson Emerald Clarke mentioned that the company’s online and pay-by-phone systems were affected.

Extent of the attack

Greenville Water did not give details regarding the attack, but notified its customers that services were temporarily suspended due to a technical glitch. 

greenville water statement

Greenville Water CEO David Bereskin said, “We have been preparing for potential attacks for years and put specific protections in place to ensure the safety of our data and the integrity of our water. While this has caused a temporary disruption, we are fairly certain that our data has not been compromised. It has created a situation where we have lost access for a brief period of time, but we anticipate normal business operations being restored in the next two-three business days." 

The company estimates that around 200MB of data, including employment application information on 1,987 people, employee information on 4,566 people, and information on 1,569 retired employees of affiliated companies has been compromised in the attack. The authorities and affected customers have been notified about the breach. 

The firm supplies water to around 50,000 residents. It has notified government officials and the regulatory bodies in the area about the breach. According to Clark, the incident is being investigated with the help of security experts, and the company is reinforcing existing security measures to mitigate future attacks.

Protect yourself against cybersecurity disasters like this by investing in a tool that will protect your network from brute-force attacks, ransomware threats, and denial-of-service (DoS) attacks. Download ManageEngine Log360, a tool that helps combat both internal and external security attacks.

How ManageEngine can help.

Log360, our comprehensive SIEM solution, can help your organization by:

  • Alerting security teams in real time about events that require their immediate attention, such as network attacks, unauthorized access attempts to files or folders, security group membership changes, and account lockouts.
  • Detecting unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 also has a global IP threat database that can instantly detect known malicious traffic passing through the network as well as outbound connections to malicious domains and callback servers. 
  • Finding potential insider threats with its user and entity behavior analytics engine, which creates a baseline of normal activities that are specific to each user and notifies security personnel instantly when there's a deviation from this norm.
  • Obtaining important forensic information about incidents. The collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
  • Automatically raising incidents as tickets to specific technicians in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.

Download a free trial of Log360 to see the tool in action for yourself.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.