More victims of yet another Click2Gov breach this week
Yet another report of a data breach involving Click2Gov software by Central Square Technology. Previous coverage of the publicly disclosed breaches from 2017, 2018, and 2019 are linked from here. Also see research reports by FireEye, Gemini Advisory, and RBS for additional background.
The latest victim to come forward — at least the most recent one I’ve found in news — is the U.S. Virgin Islands Water and Power Authority (WAPA).
According to The St. Croix Source and The Virgin Islands Consortium, WAPA is reporting a hack that has resulted in an unknown number of victims experiencing credit card or debit card fraud. Here are a few things you need to know about this latest report:
- WAPA said it first learned of the possible compromise on October 18 and reportedly notified CST that day. That would have been about the same time that Click2Gov was notifying Port Orange to suspend use of the software while they investigated “an unconfirmed software issue that may have resulted in vulnerabilities.”
- The St. Croix Source reports that WAPA claims that a forensics auditor determined that, at that time (October 18), the payment portal was not compromised. Frankly, that does not sound credible.
- When a second customer notified WAPA on October 22 of card fraud, WAPA, contacted CST again and CST reportedly later confirmed the cyberattack. According to The St. Croix Source, CST told WAPA that the Click2Gov application was hit by a “never before seen attack.”
- Central Square reportedly developed and implemented a security fix on October 25.
But “never seen before” attack? Was this or wasn’t this the same issue CST was investigating related to Port Orange in Florida? And was this the same issue that resulted in eight cities disclosing breaches in August? How many different issues has CST identified that resulted in actual hacks?
DataBreaches.net sent an inquiry to CST last night. This post will be updated when a response is received.