DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Pacers company discloses data breach

Posted on May 11, 2019 by Dissent

The company associated with the Indiana Pacers –  Pacers Sports & Entertainment (“PSE”) – issued a notice yesterday about a data security incident. Curious as to whether it impacted fans or employees, I skimmed it… only to be reminded yet again that our medical or health data can be breached in all kinds of settings.

The PSE notice indicates that there was a phishing incident that “may have affected certain personal information related to a limited number of individuals.”

PSE learned of suspicious email activity on or shortly before November 16, 2018, and their investigation subsequently revealed that an unknown actor or actors accessed a limited number of accounts between October 15 and December 4, 2018.  But if they were able to lock out the attackers by early December, why did it take until now to make notification of this incident?  Their notification states:

After a thorough review of these email accounts, PSE determined that a limited number of personal records were present in the affected emails. The organization then began diligently working to determine contact information for those individuals to notify them of the incident.

They do not disclose what a “limited number” of records or people actually means, but it appears that there was a lot of sensitive information potentially accessed and/or acquired by the attacker(s). According to their notification:

the information that may have been present in the emails may include: name, address, date of birth, passport number, medical and/or health insurance information, driver’s license/state identification number, account number, credit/debit card number, digital signature, and/or username and password. For a very small number of individuals, the data may also have included Social Security number.

So this was a high-risk situation in terms of having an attacker who had been accessing accounts with a wealth of information over a period of more than a month. The notification does not indicate whether the investigators confirmed whether data was actually exfiltrated or just accessed, but PSE is offering those affected credit monitoring services.

But if these individuals were employees of the Pacers’ organization, how difficult could it be for PSE to find contact information to notify them more quickly?  Or were these email accounts storing very old data that might no longer be accurate on contact details?

You can read PSE’s full notice here.


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Two more entities have folded after ransomware attacks
  • Global hack on Microsoft product hits U.S., state agencies, researchers say
  • Michigan ‘ATM jackpotting’: Florida men allegedly forced machines to dispense $107K
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Bitcoin holds steady as hackers drain over $40 million from CoinCDX, India's top exchange
Category: Business SectorHackU.S.

Post navigation

← Equifax Says Cybersecurity Breach Has Cost $1.4 Billion
Your most sensitive data is likely exposed online. These people try to find it →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004
  • BlackSuit ransomware site seized as part of Operation Checkmate
  • The day after XSS.is forum was seized, it struggles to come back online — but is it really them?
  • U.S. nuclear and health agencies hit in Microsoft SharePoint breach
  • Russia suspected of hacking Dutch prosecution service systems
  • Korea imposes 343 million won penalty on HAESUNG DS for data breach of 70,000 shareholders

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals
  • As companies race to add AI, terms of service changes are going to freak a lot of people out. Think twice before granting consent!
  • Uganda orders Google to register as a data-controller within 30 days after landmark privacy ruling

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.