MOVEit Vulnerability Victimizes AutoZone, 185k Records Stolen
Table of Contents
- By Steven
- Published: Nov 22, 2023
- Last Updated: Nov 23, 2023
AutoZone is a vehicle parts replacement provider and servicer. Hosting over 5,300 stores across North America alone, AutoZone is a recognizably local option for car owners stateside. AutoZone’s many locations require seamless system responses; they ensure efficient service by using applicable third-party services.
How Did the Attack Occur?
Earlier this year, a third-party file transfer software, MOVEit, was found to have a vulnerability. MOVEit’s security issue was a zero-day vulnerability, which went unnoticed by professionals until May of this year. Cybercriminals could sneakily infiltrate systems worldwide and across industries using the vulnerability. Experts have patched the issue, but not before 2,000+ organizations worldwide had information stolen.
What Information Was Viewed or Stolen?
It is unclear what information the attackers took in the breach, although signs point to full names and Social Security Numbers (SSNs) at the least. Additionally, the published consumer notice suggests those who believe the breach will impact their information should take up monitoring services. The notice suggests protections for identity, credit, and financial accounts—consequently, the assailants may have accessed that information in the breach.
How Did AutoZone Admit to the Breach?
Progress Software announced its MOVEit file transfer vulnerability in late May this year, prompting global investigations. In AutoZone’s case, the breach happened, and the employees discovered it around May 28th. However, there is a discrepancy with this timeline, as the Maine Attorney General’s office filing lists the discovery date in early November. According to the consumer notice, AutoZone’s internal investigation concluded around August 15th. Either way, consumers should expect their notifications in the coming weeks—as officials sent them on November 21st.
What Will Become of the Stolen Information?
The Maine Attorney General’s office lists a high impact figure: 184,995 records, potentially belonging to both clients and employees of AutoZone. Given the conclusion of AutoZone’s investigations, the number of stolen records is unlikely to increase. It is unlikely for AutoZone to provide more information about the attack itself because the investigations have purportedly finished. Nothing is public about the attackers or their motivations; however, because the assault presumably did not involve ransomware, the assailants may misuse the data in other ways. The only choice for those with exposed data is to act immediately to safeguard the information.
What Should Affected Parties Do in the Aftermath of the Breach?
If the hackers aim for later leverage, it may be years before the information reappears for misuse. However, AutoZone members and employees can mitigate potential damages before the stolen data resurfaces. The AutoZone notice suggests monitoring services; it is a temporary solution meant to be used simultaneously with other active precautions.
Many will find altering their accounts with multi-factor authentications and strong passwords and implementing recent updates will mitigate most threats. They should also consider signing up for alerts from their finance and health insurance; noticing suspicious activity can allow enough time to freeze accounts before notifying companies and authorities. Now that the hackers may have exposed the credentials to the internet, they could misuse it at any time. Take precautions today to mitigate the inevitable.