Cyber Attack on Consulting Firm Exposes DOJ Data of 341,000 People

Greylock McKinnon Associates, a prominent consulting firm, has reported a cyber attack that exposed personal data belonging to 341,000 individuals, including sensitive information from the Department of Justice (DOJ).

Greylock McKinnon Associates, located at 75 Park Plaza, Boston, MA, discovered the breach on February 7, 2024, although the attack occurred months earlier, on May 30, 2023.

The firm’s outside legal counsel, Linn Freedman of Robinson & Cole LLP, submitted the breach notification.

Extent of the Data Compromise

The breach has affected 341,650 individuals, with 2,067 of those being residents of Maine.

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Due to the exceeding 1,000 affected residents, consumer reporting agencies have been notified in compliance with legal requirements.

The incident was classified as an external system breach, specifically a hacking event.

The attackers managed to acquire names and social security numbers, which can lead to serious identity theft and fraud issues for the victims.

The Maine Attorney General’s Office has made a worldwide announcement regarding a cyber attack on a consulting firm, which exposed Department of Justice (DOJ) data belonging to 341,000 individuals.

Upon discovery, Greylock McKinnon Associates took immediate steps to secure their systems and mitigate further unauthorized access.

The firm has been working closely with cybersecurity experts to understand the scope and method of the attack.

The data in the breach included information from the DOJ, raising concerns about the potential misuse of government employee data.

The DOJ is investigating the breach and the implications for national security and privacy.

Given the scale of the breach, Greylock McKinnon Associates is likely to face scrutiny under various data protection laws.

The firm has been cooperating with legal entities and has begun notifying affected individuals.

Measures for Affected Individuals

Greylock McKinnon Associates offers credit monitoring services to all affected individuals and has established a dedicated helpline to address concerns and questions.

The firm also advises individuals to remain vigilant for signs of identity theft and report any suspicious activity to the authorities.

In the wake of the breach, Greylock McKinnon Associates is reviewing and enhancing its cybersecurity measures to prevent future incidents.

The firm is also working to raise awareness about the importance of robust security practices in the consulting industry.

The cyber attack on Greylock McKinnon Associates is a stark reminder of the vulnerabilities within corporate and government data systems.

As the investigation continues, the firm is committed to transparency and taking the necessary steps to protect personal information and restore trust among its clients and the public.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

2 hours ago

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its targeting…

4 hours ago

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to bypass…

4 hours ago

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message traffic,…

5 hours ago

Scattered Spider Launches Sophisticated Attacks to Steal Login Credentials and MFA Tokens

The cyber threat landscape has witnessed remarkable adaptation from the notorious hacker collective known as…

5 hours ago

North Korean Hackers Use Social Engineering and Python Scripts to Execute Stealthy Commands

North Korean threat actors have demonstrated their adept use of social engineering techniques combined with…

5 hours ago