To paint the picture of how massive this leak was, the other most recent Compilation of Multiple Breaches (COMB), which happened in 2023, was only 12% of the size of this MOAB. If you use any of the sites listed in the leak (which you probably do), your information was likely compromised.
You may be thinking: So what if they have my LinkedIn information? Why does it matter? It’s not about having your leaked personal data that makes cyber criminals so powerful, it’s what they can do with it.
Cyber criminals can use this information for identity theft and open bank accounts in your name or receive government payments meant for you. They can also use this information to create extremely believable social engineering attacks and prey on your peers.
This can sound extremely alarming and overwhelming, but know that there are a few simple steps that you can take to protect yourself and those around you from the repercussions of this data leak.
There are great websites you can use to check if your email has been found in any recent data breaches. Have I Been Pwned and Cyber News both have free tools that will tell you exactly which breaches your emails have been found in.
However, since this breach was so large and recent, it’s less of a game of “Have I been breached?” and more of “Where am I vulnerable?” Take time to go through the companies that were listed in the breach and note which ones have your information.
Then, update your passwords at each company to ensure that even if your information was leaked, hopefully, cyber criminals will no longer have access to these accounts.
Keep an eye on your bank transactions to make sure no one has gained access to your financial accounts. It is best to monitor these accounts closely for the next 2-3 months if you have ever given information to any of the businesses listed in the breach.
Now that you know about this breach, know that it is likely your family and friends have also had information leaked. This means more phishing and social engineering attacks, pretending to be people you know, may come your way. Stay on alert, take time to pause and think, and don’t be afraid to verify the sender before taking action.
Help your family and friends stay safe by sharing this story with them so they know to stay alert, too.
This story has made mainstream headlines, which is the perfect way to engage your team members in conversations about security. If they’ve already read about it, they are more likely to be interested in what you have to say and have questions prepared. Share this story in your next meeting or your main communications channel along with reflection questions or advice.
Be proactive by offering support to anyone in your organization that could be affected. By offering a helping hand to those who feel threatened by this attack, you will build trust within your security culture. This will help you in the future when they later want to report suspicious activities or ask questions. Try hosting office hours or a Q&A to assist anyone dealing with this situation.
Note that this all occurred because of a firewall failure. Take this as an opportunity to learn from someone else, and administer a check on your firewalls to ensure that they are working properly.
Collaborate with your security team to check if any of your accounts could have been possibly affected by this breach. Have each VP share any account their teams use and crosscheck with the list of affected companies.
If you have direct contacts with any of your partners who were affected, reach out to see if they have additional information on leaked emails.
As mentioned before, it’s best to assume that any accounts affiliated with this breach were affected.
Support your security team’s (likely) call to action for all employees to update passwords on all accounts. Encourage employees to set aside time for password changing and respect any changes in deadlines this may impact.
Just like individuals, it is recommended that businesses monitor their financial accounts with a stronger eye than usual for the next 2-3 months. This will ensure that if something were to happen, you catch it in time before a big impact is made.
The Mother of All Breaches serves as a wake-up call for individuals, security managers, and organizations alike. In an era where digital threats are growing, proactive measures are imperative to protect ourselves from the fallout of massive data breaches. By staying informed, updating passwords, and checking your digital defences, you can use this story as an opportunity to strengthen your organization’s security.