DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

More victims of yet another Click2Gov breach this week

Posted on November 1, 2019 by Dissent

Yet another report of a data breach involving Click2Gov software by Central Square Technology. Previous coverage of the publicly disclosed breaches from 2017, 2018, and 2019 are linked from here. Also see research reports by FireEye, Gemini Advisory, and RBS for additional background.

The latest victim to come forward — at least the most recent one I’ve found in news — is the U.S. Virgin Islands Water and Power Authority (WAPA).

According to The St. Croix Source and The Virgin Islands Consortium, WAPA is reporting a hack that has resulted in an unknown number of victims experiencing credit card or debit card fraud. Here are a few things you need to know about this latest report:

  • WAPA said it first learned of the possible compromise on October 18 and reportedly notified CST that day. That would have been about the same time that Click2Gov was notifying Port Orange to suspend use of the software while they investigated “an unconfirmed software issue that may have resulted in vulnerabilities.”
  • The St. Croix Source reports that WAPA claims that a forensics auditor determined that, at that time (October 18), the payment portal was not compromised. Frankly, that does not sound credible.
  • When a second customer notified WAPA on October 22 of card fraud, WAPA, contacted CST again and CST reportedly later confirmed the cyberattack. According to The St. Croix Source, CST told WAPA that the Click2Gov application was hit by a “never before seen attack.”
  • Central Square reportedly developed and implemented a security fix on October 25.

But “never seen before” attack? Was this or wasn’t this the same issue CST was investigating related to Port Orange in Florida? And was this the same issue that resulted in eight cities disclosing breaches in August?  How many different issues has CST identified that resulted in actual hacks?

DataBreaches.net sent an inquiry to CST last night. This post will be updated when a response is received.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Inquiry launched after identities of SAS soldiers leaked in fresh data breach
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
Category: Breach IncidentsCommentaries and AnalysesGovernment SectorHackSubcontractorU.S.

Post navigation

← Update: One or more Paterson students were allegedly responsible for district data breach
Desjardins data breach much larger than first estimated, affecting ALL 4.2 million members →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WA: Cyber-attacks problem for small hospitals
  • Florida prison data breach exposes visitors’ contact information to inmates
  • Experian Wins Appeal to Send Data Breach Victim to Arbitration
  • ICANN sends breach notice to domain registrar Webnic about failure to deal with DNS abuse compliants properly
  • Canadian cybercriminal sentenced to a year in prison for NFT theft scheme
  • Oops! Catasauqua employees’ Social Security numbers, other data accidentally sent to government watchdog group
  • EU-wide Breach Notification Template on the Horizon
  • Sex toy maker Lovense caught leaking users’ email addresses and exposing accounts to takeovers
  • Hackers wipe out Rs 384 crore from Bengaluru cryptocurrency firm Neblio Technologies; firm says inside job
  • Intelligence cyberattack on Crimea. Documents confirming abduction of children from Ukraine found

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Trump administration is launching a new private health tracking system with Big Tech’s help
  • Attorney General James Takes Action to Protect Sensitive Personal Information of Tens of Millions of People
  • Searches of Your Private Data in the Cloud Amount to Illicit State Action
  • How a Tax Subpoena in Ohio Tests European Privacy Law
  • Cambodia moves to enact comprehensive data privacy law
  • White House ordered to restore Medicaid funding to Planned Parenthood clinics
  • California Attorney General Announces $1.55M CCPA Settlement with Healthline.com

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.