Wednesday, December 18, 2024
HomeCyber Security NewsMom's Meals Breached: Over 1.2 Million Consumers Data Exposed

Mom’s Meals Breached: Over 1.2 Million Consumers Data Exposed

Published on

SIEM as a Service

PurFoods, LLC, operating under the trade name Mom’s Meals, has announced the compromise of personal information affecting its clients and employees. 

The company acknowledged that its cybersecurity defenses had been compromised, allowing unauthorized access to a treasure trove of consumer data.

The incident occurred between January 16, 2023, and February 22, 2023, with the attack involving the encryption of specific files on the company’s network. 

- Advertisement - SIEM as a Service

A third-party investigation revealed tools that could facilitate unauthorized data transfer, indicating potential data exfiltration.

The data breach has exposed a trove of sensitive information, including but not limited to:

  • Date of birth
  • Driver’s license/state identification number
  • Financial account information
  • Payment card information
  • Medical record number
  • Medicare and/or Medicaid identification
  • Health information
  • Treatment information
  • Diagnosis code
  • Meal category and/or cost
  • Health insurance information
  • Patient ID number

Less than 1% of the affected population had their Social Security numbers compromised. Total number of persons affected (including residents): 1,237,681

It’s important to emphasize that no evidence suggests misuse or further disclosure of the compromised data in the aftermath of the breach.

“It’s important to note that we have seen no evidence that any personal information was misused or further disclosed as a result of the cyberattack.”

Response and Mitigation

Mom’s Meals has undertaken a series of measures in response to the breach:

  • Notification to federal law enforcement agencies and collaboration with their investigation
  • Notification to affected individuals via U.S. Mail commenced on August 25, 2023
  • Offer of identity theft and fraud protection services, including credit monitoring and identity restoration
  • Engagement of Kroll to manage a call center for inquiries related to the breach

In light of the breach, PurFoods has prioritized reinforcing its network security and an internal review of existing policies and procedures to enhance data protection measures.

The data breach at PurFoods, LLC is a stark reminder of the persistent threats organizations face, even in sectors focused on home-delivered meals. 

Keep informed about the latest Cyber Security News by following us on Google NewsLinkedinTwitter, and Facebook.

Latest articles

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.A...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Cyber Criminals Exploit Windows Management Console to Deliver Backdoor Payloads

A recent campaign dubbed FLUX#CONSOLE has come to light, leveraging Microsoft Common Console Document (.MSC) files...

Texas Tech Systems Breach, Hackers Accessed System Folders & Files

The Texas Tech University Health Sciences Center (TTUHSC) and Texas Tech University Health Sciences...

Beware of Malicious Ads on Captcha Pages that Deliver Password Stealers

Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a...