Wednesday, February 26, 2025
HomeCyber Security NewsUS Employee Background Check Firm Hacked, 3 Million Records Exposed

US Employee Background Check Firm Hacked, 3 Million Records Exposed

Published on

SIEM as a Service

Follow Us on Google News

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services, disclosed a significant cybersecurity incident exposing the personal information of over 3.3 million individuals, including 15,198 Maine residents.

The breach occurred on February 9, 2024, but was not detected until April 22, 2024, according to a data breach notification filed with the Maine Attorney General’s office.

The compromised data includes names combined with other personal identifiers, heightening risks of identity theft and financial fraud.

Breach Timeline and Attack Methodology

The breach resulted from an external system breach (hacking) targeting DISA’s infrastructure.

Hackers infiltrated systems containing sensitive employee screening records, which often include Social Security numbers, employment histories, and criminal background data. However, the notification did not specify the exact data elements compromised.

The 76-day gap between the intrusion’s occurrence and discovery highlights potential vulnerabilities in DISA’s network monitoring protocols.

Cybersecurity experts emphasize that such delays are critical, as attackers often use this time to exfiltrate data or establish persistent access.

DISA’s role as a third-party screener for employers amplifies the breach’s gravity. The company serves industries ranging from healthcare to transportation, meaning affected individuals could include employees at sensitive organizations.

The lack of clarity on whether financial or biometric data was accessed remains a concern for privacy advocates.

Notification Protocol and Remediation Efforts

Affected individuals began receiving written notifications on February 21, 2024—12 days after the breach—though DISA has not explained why consumer alerts preceded the breach’s discovery date.

The company partnered with Experian to offer 12 months of complimentary credit monitoring and identity theft protection.

However, the notification letter did not confirm whether DISA has implemented enhanced encryption or multi-factor authentication post-breach.

Legal representatives from Holland & Knight LLP, DISA’s counsel, stated the firm is cooperating with federal investigators and cybersecurity consultants.

“DISA has taken steps to secure its systems and prevent future incidents,” said Shardul Desai, partner at Holland & Knight. No evidence of data misuse has been identified to date.

With over 3.3 million impacted individuals, this breach ranks among the largest of 2024 and could trigger investigations under the FTC’s Safeguards Rule and state privacy laws.

Maine residents—the only explicitly noted subgroup—are entitled to additional protections under the state’s stringent data privacy laws.

DISA’s Houston headquarters (11740 Katy Freeway, Suite 900) and corporate parent companies may face litigation, particularly if plaintiffs demonstrate negligence in safeguarding data.

Cybersecurity analysts criticize DISA’s breach description as overly vague, arguing that transparency about attack vectors (e.g., ransomware, phishing) is crucial for public trust.

The incident underscores risks inherent in centralized repositories of employee data, prompting calls for decentralized verification systems using blockchain or zero-knowledge proofs.

Recommendations for Affected Individuals

Those impacted should:

  1. Enroll in Experian’s monitoring service using the provided activation code
  2. Place fraud alerts with all three credit bureaus
  3. Review employment records for unauthorized disclosures
  4. Monitor bank and insurance statements for suspicious activity

DISA has established a dedicated call center for inquiries, though the notification did not specify its hours or international accessibility.

As background check firms increasingly digitize records, this breach serves as a cautionary tale for the $4 billion employee screening industry.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have...

Millions of WordPress Websites Vulnerable to Script Injection Due to Plugin Flaw

A critical security vulnerability in the Essential Addons for Elementor plugin, installed on over 2 million...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

GRUB2 Flaws Expose Millions of Linux Devices to Exploitation

A critical set of 20 security vulnerabilities in GRUB2, the widely used bootloader for...

Orange Communication Breached – Hackers Allegedly Claim 380,000 Email Records Exposed

Telecommunications provider Orange Communication faces a potential data breach after a threat actor using the pseudonym “Rey”...

RSync Vulnerabilities Allow Hackers to Take Full Control of Servers – PoC Released

A series of critical security vulnerabilities in the widely-used Rsync file synchronization tool have...