PurFoods, a US food delivery company trading as Mom’s Meals, recently disclosed a cyberintrusion that occurred from January 16 to February 22, 2023. The company reported that the cyberattack involved the encryption of certain files in their network and could not rule out the possibility of data exfiltration. While it remains uncertain how many people were affected, estimates suggest over 1.2 million individuals were impacted. The compromised information included personal data such as date of birth, driver’s license/state identification number, financial account details, medical records, health insurance information, and patient ID numbers. Social Security numbers were involved for less than 1% of the individuals affected. The reason for collecting customers’ medical details is due to the company’s specialization in providing meals for individuals with specific dietary needs. Customers are advised to consider replacing their payment cards, closely monitor their financial statements, and implement a credit freeze for added protection. For companies handling sensitive personal information, it is crucial to act immediately upon detecting anomalies in the network and consider using Managed Detection and Response (MDR) services. Transparency and timely data breach notifications are also essential. The average dwell time in ransomware attacks is now only five days, highlighting the need for constant monitoring and quick response. It is recommended to seek expert assistance if resources or expertise are limited. In conclusion, cybersecurity should not be neglected, and proactive measures should be taken to safeguard against cyber threats.
1. PurFoods, trading as Mom’s Meals, experienced a cyberintrusion from January 16 to February 22, 2023.
2. The cyberattack involved the encryption of specific files, with potential data exfiltration.
3. Over 1.2 million individuals may have been affected, including clients, employees, and contractors.
4. Compromised information includes personal and medical data.
5. Affected customers should replace payment cards, monitor financial statements, and consider a credit freeze.
6. Companies should promptly respond to anomalies, consider MDR services, and prioritize transparency in data breach notifications.
7. The average dwell time in ransomware attacks is only five days, emphasizing the need for constant monitoring and quick response.