Recently, all the Georgians had experienced a terrible data breach. More than 4.9 million Georgians’ personal information, including full names, home addresses, dates of birth, ID numbers, and mobile phone numbers, were shared online as an MDB file. According to Georgia’s 2019 census, the current population in Georgia is around 3.7 million. However, the entire file is 1.04 GB and it contained 4,934,863 records. Among these records, personal details for millions of deceased citizens were also included. This terrible data breach was disclosed because the hackers had published these personal details on a hacking forum on March 28th, Saturday.
So far, no one knows where the data is obtained from, and if the forum users who shared the data are the hackers who steal this info. According to the news report, the leak was estimated as coming from Georgia’s Central Election Commission (CEC). However, the commission stated that the data was not originated from their servers on Monday, because the published information is the information that they don’t usually collect. In addition, one of the forum users who share the data online declined to disclose the origination of this data though, he later clarified that the data was not from CEC. It is actually a misunderstanding as it was said that these personal details could be used by CEC for verifying data, but not the data was originated from CEC.
LIFARS’ Incident Response and Digital Forensic highly skilled team of professionals will effectively manage data breach response, examine digital evidence and compromised systems for forensic artifacts of threat actor actions, lateral movement and data exfiltration, including social security numbers, driver licenses, health records, or any other sensitive data. Our skilled investigative team leverages knowledge from previous investigations to better understand an attacker’s lateral movement through an enterprise using attacker exploitation techniques, tactics and procedures (TTP) and collected set of Indicators of Compromise(IOCs). Communication with executives and board is done on a daily basis.
Military Precision: We strike with military precision execution to identify and contain the threat upon arrival for the prevention of further damage to your brand and reputation. Data breach response has to be internally trained, and key tenant stakeholders’ contribution and preparedness is crucial for mission success. Computer security incident management maturity can be enforced by constant exercises.
Consummate Investigation: As a natural extension of your internal Information Security and IT staff, our experts guide you step by step through the entire process of an Incident. Poised, streamlined communications throughout our in-depth investigation. We help you answer the important questions your CEO is asking: “How, When, Why, and What are the ultimate damages affecting the core business?”
Recovery and Post Incident Reporting: Upon containing the immediate threat, we will work with your internal IT teams to undergo a complete infection removal process. Providing a thorough and diligent threat conversion. Our Incident Response life-cycle concludes with a report listing, by priority and the recommended actions to elevate your Cyber Resiliency to prevent similar attacks in the future.