Posted on Jul 5, 2015
Durham, North Carolina-based LC Industries has recently reported a security data breach, according to SC Magazine. The breach, which occurred in early June, affects a total of 3,754 customers, and affected 22 specific customers in New Hampshire, hence a public notification to the Department of Justice in the state. The breach originated from one of the retail companies' LC Industries owns, Tactical Assault Gear, based in Imperial Beach, California.
LC Industries manufactures over 2,000 products, many which are focused on serving the needs of military personnel on bases across the United States including mattresses, broomsticks, plastics, paper conversion, assembly, packaging, and kitting, and chemical light sticks. LC Industries is also a distributor with over 4,500 products in its inventory, according to the company's website, operating out of Las Vegas and Durham. The company also operates BuyLCI.com, an e-commerce site for office supplies which operates retail stores on 31 military bases in the United States.
"During the course of our investigation, we learned that the Code [malicious software code] was being used to access and acquire personal information," wrote Rick Stallings, CFO of LC Industries, in his letter to the New Hampshire DoJ. "The personal information that may have been compromised includes individual names..., credit card numbers (including security code and expiration date), email addresses, Website account usernames, and Website account passwords."
The malware infection duration for Tactical Assault Gear's website does not grade particularly well for its IP reputation within the SecurityScorecard platform. The average malware infection duration is 2 days, which is higher than 92% of industry companies. The company receives a 'B' for DNS Health, however, it has 'A' grades for network security and endpoint security.
SecurityScorecard's recently published research, The Current State of Banking Malware, discovered that the manufacturing industry had the highest rate of infection (over 27%) within the Dridex banking malware through the first two quarters of 2015. Similarly, the second highest ranking infections for Driedex were found in the retail industry (at 20.7%). Dridex is known to be spread through spam campaigns that contain malicious XML attachments.
SecurityScorecard sinkholes have identified a rising threat trend for credential-based, wire-transfer bank fraud within the following malware classifications: Dridex, Bebloh, and TinyBanker. These malware classes have been located in 159 unique corporate domains and are validated by internal, SecurityScorecard threat intelligence resources— and intelligence provided by other security firms observing similar patterns.
In addition, SecurityScorecard discovered 11,952 total infections affecting 4,703 unique organizations across 55 total malware classifications. These newer strains are using the same functionality as the Zeus banking malware, but they are stealthier.
Check out our list of 3 top third party risk management (TPRM) challenges, and the actions you can take to bolster your program. Learn more.
Performing cybersecurity risk assessments is a key part of any organization’s information security management program. Read our guide.
Templates and vendor evaluations are needed to level that playing field, in a time efficient and fair way, so that the best vendors are chosen.
Co-founder and CEO, Alex Yampolskiy, speaks about the importance of measuring and acting on key indicators of cybersecurity risk.
You’ve invested in cybersecurity, but are you tracking your efforts? Check out our list of 20 cybersecurity KPIs you should track. Read more.
No waiting, 100% Free
Get your free scorecard and learn how you stack up across 10 risk categories. Answer a few simple questions and we'll instantly send your score to your business email.