Delaware Life Insurance MOVEit Breach Exposes Producer and Client Data

  • By Steven
  • Published: Nov 24, 2023
  • Last Updated: Nov 27, 2023

Delaware Life Insurance MOVEit Breach exposes data

Group 1001 is the parent company of Delaware Life, a long-term financial consultant for organizations. Delaware Life uses a third-party vendor, Pension Benefit Information (PBI), for analysis and research services. PBI, in turn, operates with software created by industry-standard developers; Progress Software’s MOVEit file transfer application is one of these.

How Did the Attack Occur? 

MOVEit is a file transfer software that allows the fluid movement of data between systems; it has been used by thousands of organizations worldwide and within numerous industries. In May, Progress Software announced a zero-day vulnerability within MOVEit’s infrastructure. The result was cybercriminals flocking to the weak spot and experts immediately taking defensive maneuvers. PBI began a reactive system review and discovered an unauthorized actor accessed the information of its producers and clients.

What Information Was Viewed or Stolen? 

The stolen information consists of identifiable data, including full names, residential addresses, dates of birth, and Social Security Numbers (SSNs). Some people may have also had their contract, group number, or policy number stolen. These credentials are enough to cause anyone to fall victim to fraudulent crimes; the corresponding consumer and provider notices point to this, as they suggest monitoring services for those with exposed data. 

How Did Delaware Life Insurance Admit to the Breach? 

In February of this year, Delaware Life discovered ransomware within its systems. They reacted by conducting an investigation. In July, they partially finished the review and sent notices to those believed to be involved. Progress Software announced the MOVEit vulnerability in May, prompting PBI’s investigation. Months later, producers and clients initially not thought impacted may receive notifications. 

What Will Become of the Stolen Information? 

The future of the stolen data is uncertain, mainly because no threat actors claim they have the credentials. Further, though the notices state ransomware was initially involved in the event, they do not indicate the threat actors’ demands. Presumably, this is due to PBI rejecting the demands; regardless of how PBI responded to the attack, consumer and provider information may still be at risk. The assailants having access to the data is enough to warrant precautions.

What Should Affected Parties Do in the Aftermath of the Breach? 

The total impact of this breach remains unclear; the notices only offer limited information about who may have had their data accessed. Currently, providers and individual clients have had their data access, although the details differ between individuals. Consumers and group members can expect their letter notice in the coming weeks, while providers may need more time. According to the provider notice, Delaware Life will send a list of data of potentially exposed employees

Providers and clients don’t need to wait for their physical notice to start taking control of their data security. Make the most of software defenses by enabling multi-factor authentication on all accounts, then update passwords with complex, strong passwords. Most will benefit from investing in monitoring services, deploying suspicious activity alerts, and freezing accounts when possible. Delaware Life providers and clients may have had their data stolen, but there is always time to mollify damages.

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close