Delaware Life Insurance MOVEit Breach Exposes Producer and Client Data

  • By Steven
  • Published: Nov 24, 2023
  • Last Updated: Nov 27, 2023

Delaware Life Insurance MOVEit Breach exposes data

Group 1001 is the parent company of Delaware Life, a long-term financial consultant for organizations. Delaware Life uses a third-party vendor, Pension Benefit Information (PBI), for analysis and research services. PBI, in turn, operates with software created by industry-standard developers; Progress Software’s MOVEit file transfer application is one of these.

How Did the Attack Occur? 

MOVEit is a file transfer software that allows the fluid movement of data between systems; it has been used by thousands of organizations worldwide and within numerous industries. In May, Progress Software announced a zero-day vulnerability within MOVEit’s infrastructure. The result was cybercriminals flocking to the weak spot and experts immediately taking defensive maneuvers. PBI began a reactive system review and discovered an unauthorized actor accessed the information of its producers and clients.

What Information Was Viewed or Stolen? 

The stolen information consists of identifiable data, including full names, residential addresses, dates of birth, and Social Security Numbers (SSNs). Some people may have also had their contract, group number, or policy number stolen. These credentials are enough to cause anyone to fall victim to fraudulent crimes; the corresponding consumer and provider notices point to this, as they suggest monitoring services for those with exposed data. 

How Did Delaware Life Insurance Admit to the Breach? 

In February of this year, Delaware Life discovered ransomware within its systems. They reacted by conducting an investigation. In July, they partially finished the review and sent notices to those believed to be involved. Progress Software announced the MOVEit vulnerability in May, prompting PBI’s investigation. Months later, producers and clients initially not thought impacted may receive notifications. 

What Will Become of the Stolen Information? 

The future of the stolen data is uncertain, mainly because no threat actors claim they have the credentials. Further, though the notices state ransomware was initially involved in the event, they do not indicate the threat actors’ demands. Presumably, this is due to PBI rejecting the demands; regardless of how PBI responded to the attack, consumer and provider information may still be at risk. The assailants having access to the data is enough to warrant precautions.

What Should Affected Parties Do in the Aftermath of the Breach? 

The total impact of this breach remains unclear; the notices only offer limited information about who may have had their data accessed. Currently, providers and individual clients have had their data access, although the details differ between individuals. Consumers and group members can expect their letter notice in the coming weeks, while providers may need more time. According to the provider notice, Delaware Life will send a list of data of potentially exposed employees

Providers and clients don’t need to wait for their physical notice to start taking control of their data security. Make the most of software defenses by enabling multi-factor authentication on all accounts, then update passwords with complex, strong passwords. Most will benefit from investing in monitoring services, deploying suspicious activity alerts, and freezing accounts when possible. Delaware Life providers and clients may have had their data stolen, but there is always time to mollify damages.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What you need to know about the Krispy Kreme Data Breach

What you need to know about the Krispy Kreme Data Breach

The popular doughnut and coffeehouse chain Krispy Kreme was established in 1937 in Winston-Salem, North Carolina. It has grown over the years and currently operates 1,500 shops and 17,900 points of access in 40 nations.

What You Need to Know about the Ocuco Data Breach

What You Need to Know about the Ocuco Data Breach

Ocuco is a Dublin-based organization that specializes in optical software solutions. Established in 1993 by Leo Mac Canna, the company initially developed software for independent optometrists.

What You Need to Know about the TxDOT Data Breach

What You Need to Know about the TxDOT Data Breach

The Texas Department of Transportation (TxDOT) is responsible for designing, planning, operating, building, and maintaining the state's transportation system to deliver a reliable and safe transportation system.

What You Need to Know about the AT&T Data Breach

What You Need to Know about the AT&T Data Breach

AT&T, one of the largest telecommunications providers in the United States and the fourth-largest telecommunications company in the world by revenue, experienced a significant data leak, which became public in June 2025.

What You Need to Know about the Mainstreet Bank Data Breach

What You Need to Know about the Mainstreet Bank Data Breach

MainStreet is a community-oriented bank in Fairfax, Virginia. Established in 2004, it is under the MainStreet Bancshares Incorporated, a small-cap financial holding organization.

What You Need to Know about the Cartier Data Breach

What You Need to Know about the Cartier Data Breach

Swiss-owned luxury jeweler, Cartier, has had its website hacked and customer data compromised in the incident. Cartier, a subsidiary of Richemont, produces some of the world's finest watches, bracelets, and necklaces, which have been worn by Michelle Obama, Taylor Swift, and Angelina Jolie.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close