Back to Ransomware

Ransomware

Data breach at Home Group affects thousands of users.

On October 21, Home Group, one of the biggest housing associations in the UK with an annual turnover of over £360 million, reported that a data breach affected personal details of thousands of users. The compromised information includes names, addresses, and contact information of nearly 4,000 people.

The aftermath.

The incident was identified with the help of a third-party cybersecurity researcher. Fortunately, it was able to contain the situation within 90 minutes of detection, however, security experts claim that even a window as small as this is enough for attackers to gain access to important records. The affected customers were spread over properties in England, including those in the North-East, North-West, and Yorkshire. Fortunately, no bank or payment details were affected. 

In a statement, John Hudson, chief financial officer at Home Group, said, “We have a robust incident response protocol in place to handle situations such as this, which meant the vulnerability was identified and fixed extremely quickly.” Home Group has taken steps to notify all the affected customers regarding the breach and assured them that it follows strict guidelines and protocols when it comes to data sharing and cybersecurity.

Fortunately, a third-party researcher came to the Home Group’s aid this time. To avoid falling victim to attacks like these, it's important to invest in a tool that will protect your network from brute-force attacks, ransomware threats, and denial-of-service (DoS) attacks. Download ManageEngine Log360, a tool that helps combat both internal and external security attacks.

How ManageEngine can help.

Log360, our comprehensive SIEM solution, can help your organization by:

  • Alerting security teams in real time about events that require their immediate attention, such as network attacks, unauthorized access attempts to files or folders, security group membership changes, and account lockouts.
  • Detecting unauthorized network access attempts with its built-in Structured Threat Information eXpression (STIX/TAXII) feeds processor. Log360 also has a global IP threat database that can instantly detect known malicious traffic passing through the network as well as outbound connections to malicious domains and callback servers. 
  • Finding potential insider threats with its user and entity behavior analytics engine, which creates a baseline of normal activities that are specific to each user and notifyies security personnel instantly when there's a deviation from this norm. 
  • Obtaining important forensic information about incidents. The collected logs can be securely archived to help prove adherence to compliance standards and reduce potential legal penalties during investigations.
  • Automatically raising incidents as tickets to specific technicians in ServiceDesk Plus, JIRA, Zendesk, Kayako, or ServiceNow to create an incident resolution process that's swift and accountable.

Download a free trial of Log360 to see the tool in action for yourself.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.