Back to Data breach

Data breach

Database breach at Oregon Construction Contractors Board compromises information of hundreds of contractors.

oregon-contractors-data-stolen

During an audit on April 12, 2019, the Oregon Construction Contractors Board (CCB) discovered that hackers accessed their database from October 27 to 29, 2018. Contractors' personal information including names, email addresses, mailing addresses, password hashes, state IDs, and driver licenses were compromised.

The incident.

This breach was brought to light during a database audit conducted by the Enterprise Security Office. Out of 8,013 contractor accounts, 466 accounts contained personal information. The CCB immediately took steps to contain this incident, ensuring that intruders could no longer gain entry to the database. Additionally, they notified all the contractors about the incident and requested that they reset their passwords. The CCB is also offering one free year of identity theft and ID theft recovery services to all the affected members.

Databases are primary targets since they contain the sensitive information of organizations and customers. Hackers attack these databases with a wide range of techniques, like SQL injection, cross-site scripting, brute force attacks, and more. Investing in a good security information and event management (SIEM) solution is the key to identifying threats before they cause significant damage. Download Log360 to combat internal and external security attacks.

How ManageEngine can help you in such situations:

Log360, our comprehensive SIEM solution, can help your organization by:

  • Alerting security teams in real time about events that require their immediate attention, such as network attacks, unauthorized access attempts to files or folders, security group membership changes, and account lockouts.
  • Detecting unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 also has a global IP threat database, through which it can instantly detect known malicious traffic passing through the network, as well as outbound connections to malicious domains and callback servers. Its global IP threat database contains more than 600 million blacklisted IP addresses that are collected from trusted open-source threat feeds and updated daily.
  • Finding potential insider threats with its user and entity behavior analytics engine, which creates a baseline of normal activities that are specific to each user, and then notifies security personnel instantly when there's a deviation from this norm. Rather than using static threshold values, Log360 employs a combination of data analytics and machine learning to define dynamic thresholds based on real-world user behavior.
  • Obtaining important forensic information about incidents. The collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
  • Automatically raising incidents as tickets to specific technicians in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.

Download a free trial of Log360 to see the tool in action for yourself.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.

2022 Zoho Corporation Pvt. Ltd. All rights reserved.