Blackbaud blasted for failing to prevent customer breaches

Blackbaud blasted for failing to prevent customer breaches

A supply chain attack at software application provider Blackbaud in 2020 saw information on several UK organisations jeopardized. The United States authorities are now taking actions to guarantee it can’t occur once again

https://cdn.ttgtmedia.com/rms/computerweekly/Alex-Scroxton-CW-Contributor-2022.jpg” alt=”Alex Scroxton”>

By

Released: 05 Feb 2024 15:45

3 and a half years on from a terrible 2020 ransomware attack that resulted in information breaches at countless downstream consumers of cloud software application business Blackbaudthe US-based provider has actually been blasted by authorities over significant cyber security failings, and purchased to take restorative actions.

Blackbaud specialises in monetary, fundraising and admin software application pitched at universities and non-profits. The attack on its systems in 2020 is understood to have actually affected the information of several UK universities, consisting of Aberdeen, Birmingham, Bristol, Brunel, Durham, East Anglia, Exeter, Glasgow, Heriot-Watt, Kent, Leeds, Liverpool, London, Loughborough, Manchester, Northampton, Oxford Brookes, Reading, Robert Gordon, Staffordshire, Strathclyde, Sussex and West London.

Non-profit victims consist of Action on Addiction, Breast Cancer Now, the Choir without any Name, Maccabi GB, the National Trust, Sue Ryder, the Urology Foundation and the Wallich. Information on Labour Party donorswas likewise taken.

At every action in its reaction, it has actually because emerged, Blackbaud stopped working to follow identified and advised occurrence action finest practice.

The attack started in February 2020 and was found in May, however Blackbaud waited practically 2 months to notify victims. It then honestly revealed it had actually paid a ransom of 24 bitcoin in exchange for a guarantee that the ransomware gang would erase the information, however never ever validated that this was done.

In a grievance released on 1 February, the United States Federal Trade Commission (FTC) stated that Blackbaud stopped working to carry out proper safeguards to safeguard and protect its consumers’ information.

“Blackbaud’s inferior security and information retention practices permitted a hacker to get delicate individual information about countless customers,” stated Samuel Levine, director of the FTC’s Bureau of Consumer Protection. “Companies have an obligation to protect information they keep and to erase information they no longer require.”

In its problem, the FTC stated Blackbaud tricked its clients by stopping working to carry out physical, electronic and procedural safeguards to safeguard their information in spite of having actually assured to do so.

To name a few things, it stopped working to keep an eye on duplicated efforts to burglarize its systems, sector information to avoid them from accessing it, guarantee that unnecessary information was erased, carry out multi-factor authentication (MFA), and test, evaluation and examine its security controls. It likewise enabled its own workers to utilize default, weak or similar passwords throughout their accounts.

As an outcome of these concerns, the hazard star behind the invasion had the ability to move easily around numerous environments at will, making use of existing vulnerabilities and admin accounts, and accessing and getting rid of unencrypted information on the company’s clients.

Furthermore, the FTC stated, Blackbaud was keeping information for far longer than was needed for the function for which it was preserved– as such, a few of the information associated with organisations that were no longer clients.

The FTC likewise pointed out the two-month hold-up in notice, despite the fact that Blackbaud was aware its aggressor had actually gotten delicate information consisting of monetary details and United States Social Security numbers. This hold-up, it stated, damaged common individuals who were not able to do anything to safeguard themselves versus identity theft or other damages.

Moving forward, the FTC is proposing an order needing Blackbaud to erase information it no longer requires to supply product and services to clients, and forbiding it from misrepresenting its security practices. The FTC’s order will likewise require the business establishes a “extensive” cyber security program to attend to the concerns that were discovered, which it be made to inform the FTC if it experiences a notifiable breach in future.

Blackbaud has actually formerly been punished by the Securities and Exchange Commission, the United States monetary regulator, over its deceptive action to the cyber attack. In addition, in 2015, it reached a contract to pay $49.5 m, divided throughout all 50 US states, to fix their examinations that it broke state laws and the federal Health Insurance Portability and Accountability Act. It was likewise reprimanded by the Information Commissioner’s Office in the UK.

Learn more on Data breach occurrence management and healing

Learn more

Leave a Reply

Your email address will not be published. Required fields are marked *