KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
New York’s Department of Financial Services (DFS) warns of an ongoing series of attacks resulting in the theft of personal information belonging to hundreds of thousands of New Yorkers.
The warning follows another alert issued last month describing how this aggressive cybercrime campaign exploits cybersecurity flaws found in public-facing websites to steal Nonpublic Information (NPI).
The attacks fuel an increasingly large fraud campaign claiming pandemic and unemployment benefits using the stolen nonpublic information.
To make it easier to understand the scale of the problem, the New York State Department of Labor prevented fraudsters from stealing over $5.5 billion in unemployment benefits since the start of the pandemic after identifying more than 425,000 fraudulent unemployment claims.
Additionally, at least $36 billion of the $360 billion expended under the CARES Act through September 30, 2020, could be improper payments that can largely be attributed to fraud as reported by the US Department of Labor’s Office of the Inspector General.
“This cybercrime campaign is a serious threat to the personal information of New Yorkers, and we urge all personal lines insurers and other financial services companies to take aggressive action to prevent the further loss of consumer information,” NY DFS’ cybersecurity division said.
“All financial services companies should immediately check for any evidence of this cybercrime and ensure that they have implemented of the robust access controls required by DFS’s cybersecurity regulation, 23 NYCRR 500 et seq.
Companies targeted by these attacks are asked to immediately take action to protect New Yorkers’ data from this ongoing campaign.
“We urge personal lines insurers and other financial services companies to avoid displaying prefilled NPI on public-facing websites considering the serious risk of theft and consumer harm,” the state’s DFS said.
The threat actors focus their attacks on insurance agent portals and Instant Quote Websites hosted by auto insurers and other financial services companies where consumers’ NPI is automatically prefilled using data prefill systems.
They are using multiple methods to harvest their targets’ NPI (the first two are recently added tactics):
The NPI stolen by the attackers behind this campaign includes consumers’ name, date of birth, address information, driver’s license number, vehicle make, vehicle model, vehicle identification number (VIN), and household members’ associated data.
Scammers use the NPI harvested in this large-scale operation to claim various types of benefits in the name of their victims, which has resulted in a massive increase in benefits fraud, according to New York’s Department of Financial Services.
NY DFS’ cybersecurity division added that the increase of attacks targeting consumers’ NPI seems to coincide “with the implementation of enhanced identity requirements to obtain pandemic benefits in New York.”
There is also a high chance that the stolen private information could get into the hands of identity thieves. The US Federal Trade Commission (FTC) says that the number of identity theft reports doubled in 2020 compared to 2019, with a record of 1.4 million reports within one year.
While New Yorkers targeted by this cybercrime campaign can’t protect their NPI from being harvested and used for fraud, targeted companies can take mitigation measures to fend off these ongoing attacks by: