MoneyGram confirms hackers stole customer data in cyberattack

MoneyGram confirms hackers stole customer data in cyberattack

October 7, 2024 at 07:00PM

MoneyGram suffered a cyberattack in September, causing a five-day outage. Hackers accessed customer data between September 20 and 22, 2024, stealing sensitive information such as contact details, dates of birth, Social Security numbers, government-issued IDs, and transaction data. The breach notification advises affected customers to await further details on the stolen data. MoneyGram is investigating with assistance from CrowdStrike.

Based on the meeting notes, it is evident that MoneyGram experienced a significant cyberattack in September 2024, resulting in the theft of customers’ personal information and transaction data. The attack, initially detected on September 27th, prompted a five-day outage as the company shut down its IT systems.

Further investigation revealed that the threat actors had access to MoneyGram’s network between September 20 and 22, during which they stole a range of sensitive customer information, including transaction details, email addresses, postal addresses, names, phone numbers, utility bills, government IDs, and social security numbers.

The stolen data varied depending on the affected customer, and MoneyGram has pledged to inform impacted individuals through data breach notifications. The attack involved social engineering tactics, with threat actors impersonating employees to gain access to the network before targeting Windows active directory services to steal employee information.

CrowdStrike has been engaged to assist MoneyGram in investigating the incident, although the identity of the attackers remains unknown and no claims of responsibility have been made. Importantly, it has been confirmed that the attack was not related to ransomware.

Additionally, the meeting notes include a confidential contact method for individuals with information about this incident or any other undisclosed attacks: via Signal at 646-961-3731 or at [email protected].

Full Article