Scammers use DocuSign API to send fraudulent invoices
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
A sophisticated social engineering attack on pharmacy giant Rite Aid has exposed the personal information of 2.2 million customers – the latest of a series of large-scale data breaches affecting major US companies. On July 16, 2024, Rite Aid reported a data breach occurring a month earlier on June 6. Hackers successfully impersonated a Rite Aid employee, gaining unauthorized access to sensitive business systems.
The attack began when hackers successfully impersonated a Rite Aid employee, compromising their credentials to gain unauthorized access to the company’s business systems. The cybercriminals used these stolen credentials to log into Rite Aid’s network, bypassing initial security measures.
Once inside, they were able to access and exfiltrate sensitive customer data from a specific timeframe.
The ransomware group RansomHub has claimed responsibility for the attack, threatening to leak the stolen data unless a ransom is paid.
These sophisticated breach tactics mirror those employed in the recent Snowflake supply chain attacks, which affected major companies including Ticketmaster, Santander Bank, and multiple-breach victim AT&T, who also suffered a major breach exposing 73m customer records earlier this year.
An impersonation attack occurs when a malicious actor poses as a trusted person or entity to deceive employees and gain unauthorized access to sensitive information, systems, or funds. The process typically involves:
These attacks often rely on social engineering tactics, exploiting human psychology to manipulate victims. Common methods include phishing emails, phone calls (vishing), text messages (smishing), and the use of fake websites (cousin domains). Attackers may also employ more sophisticated techniques like man-in-the-middle attacks or account takeovers.
Compromised customer information includes:
Rite Aid has stated that no Social Security numbers, financial information, or patient data were impacted. The affected data is associated with purchases or attempted purchases made between June 6, 2017, and July 30, 2018.
Rite Aid detected the unauthorized access within 12 hours and immediately took steps to terminate it. The company has engaged third-party cybersecurity experts to assist with the investigation and system restoration and has reported the incident to relevant authorities.
As a precautionary measure, Rite Aid is offering 12 months of free credit monitoring and identity protection services to affected individuals.
The full impact of the breach is still unfolding. However, cybersecurity experts warn that the stolen data could be sold on the dark web, potentially leading to identity theft or financial fraud. The incident will likely also have reputational consequences for Rite Aid, which is already navigating a complex bankruptcy restructuring process.
The theft of customer data in breaches like this one poses significant downstream risks, particularly for accounts payable (AP) teams. Here’s how:
Finance leaders should ensure AP teams are equipped in two areas:
CFOs, beware: cybercriminals are exploiting DocuSign’s legitimate business tools to deliver fraudulent invoices directly through trusted channels. This scheme is particularly dangerous …
Because LinkedIn is used as a professional networking platform, account holders don’t use the same caution as they would on Facebook or …
Fraud is usually associated with deception, manipulation, and crime, but what many people don’t realize is that not all scams are illegal. …
Eftsure provides continuous control monitoring to protect your eft payments. Our multi-factor verification approach protects your organisation from financial loss due to cybercrime, fraud and error.