Thursday, April 3, 2025
HomeCyber AttackCyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People

Cyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People

Published on

SIEM as a Service

Follow Us on Google News

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals, including sensitive information from the Department of Justice (DOJ).

Greylock McKinnon Associates, located at 75 Park Plaza, Boston, MA, discovered the breach on February 7, 2024, although the attack occurred months earlier, on May 30, 2023.

The firm’s outside legal counsel, Linn Freedman of Robinson & Cole LLP, submitted the breach notification.

Extent of the Data Compromise

The breach has affected 341,650 individuals, with 2,067 of those being residents of Maine.

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Due to the exceeding 1,000 affected residents, consumer reporting agencies have been notified in compliance with legal requirements.

The incident was classified as an external system breach, specifically a hacking event.

The attackers managed to acquire names and social security numbers, which can lead to serious identity theft and fraud issues for the victims.

The Maine Attorney General’s Office has made a worldwide announcement regarding a cyber attack on a consulting firm, which exposed Department of Justice (DOJ) data belonging to 341,000 individuals.

Upon discovery, Greylock McKinnon Associates took immediate steps to secure their systems and mitigate further unauthorized access.

The firm has been working closely with cybersecurity experts to understand the scope and method of the attack.

The data in the breach included information from the DOJ, raising concerns about the potential misuse of government employee data.

The DOJ is investigating the breach and the implications for national security and privacy.

Given the scale of the breach, Greylock McKinnon Associates is likely to face scrutiny under various data protection laws.

The firm has been cooperating with legal entities and has begun notifying affected individuals.

Measures for Affected Individuals

Greylock McKinnon Associates offers credit monitoring services to all affected individuals and has established a dedicated helpline to address concerns and questions.

The firm also advises individuals to remain vigilant for signs of identity theft and report any suspicious activity to the authorities.

In the wake of the breach, Greylock McKinnon Associates is reviewing and enhancing its cybersecurity measures to prevent future incidents.

The firm is also working to raise awareness about the importance of robust security practices in the consulting industry.

The cyber attack on Greylock McKinnon Associates is a stark reminder of the vulnerabilities within corporate and government data systems.

As the investigation continues, the firm is committed to transparency and taking the necessary steps to protect personal information and restore trust among its clients and the public.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...