Canada Post customer records stolen following cyberattack on supplier

Desy Papper

The details of some 44 commercial customers of Canada Post covering about 950,000 receiving customers is believed to have been stolen following a cyberattack that targeted a key supplier. In a statement May 26, Canada Post said it had been told May 19 by Commport Communications International Inc., an electronic data exchange solution […]

The details of some 44 commercial customers of Canada Post covering about 950,000 receiving customers is believed to have been stolen following a cyberattack that targeted a key supplier.

In a statement May 26, Canada Post said it had been told May 19 by Commport Communications International Inc., an electronic data exchange solution supplier used by the corporation, that it had suffered a data breach. The data stolen related to shipping manifest data held in its systems that was associated with some Canada Post customers.

“Shipping manifests are used to fulfill customer orders,” Canada Post explained. “They typically include sender and receiver contact information that you would find on shipping labels, such as the names and addresses of the business sending the item and the customer receiving it.”

The stolen data covered July 2016 to March 2019, with 97% of the records consisting of only the names and addresses of the receiving customer. The remaining 3% also included email addresses or phone numbers.

Canada Post claims that a detailed forensic investigation into the data breach had found no evidence of financial data being stolen. “We are now working closely with Commport Communications and have engaged external cybersecurity experts to fully investigate and take action,” Canada Post added.

The exact form of the attack was not detailed and Commport Communications has not made any public statement on the data breach. That said, it’s believed that the attack involved the Lorenz ransomware group.

Bleeping Computer reported May 27 that Lorenz posted on its data leak site in December that it had breached Commport Communications during a ransomware attack. Since then, the group has published 35.3 gigabytes of data allegedly stolen in the attack.

The Lorenz ransomware group started making headlines earlier this month. It is a double-tap ransomware group that both encrypts and steals files, demanding a ransom payment for both a decryption key and a promise not to publish stolen data.

“Cybercriminals work to achieve two things — money and data they can sell for money,” James McQuiggan, security awareness advocate at security awareness training company KnowBe4 Inc., told SiliconANGLE. “Data breaches where they can steal names, email addresses and phone numbers are a good source of revenue and can be added to more extensive, accumulated data from other breaches.”

What they do is cross-reference the information to create and verify a digital profile of individuals, McQuiggan explained. “This action helps increase the confidence of the data for the cybercriminal to create targeted or spear-phishing emails to lure the victim into clicking a link and gaining access to their system,” he said.

Demi Ben-Ari, chief technology officer and founder of security management firm Panorays Ltd., noted that it may not seem obvious that a supplier that manages shipping data for a postal agency would be the entry point for a cyberattack, but that’s exactly what happened here.

“Cyber incidents such as these illustrate why it’s so essential for organizations from every industry to assess and continuously monitor all of their third parties in order to pinpoint and close cyber gaps,” Ben-Ari said. “This can be accomplished most effectively with a combination of external attack surface assessments and customizable automated security questionnaires, while also considering business context.”

Photo: Phillip Jeffrey/Flickr

Since you’re here …

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission:    >>>>>>  SUBSCRIBE NOW >>>>>>  to our YouTube channel.

… We’d also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.

Next Post

Can employers require COVID vaccine? EEOC says vaccination rules OK

Businesses can require their employees to be vaccinated against COVID-19 without violating federal Equal Employment Opportunity Commission laws, the agency says.  Businesses can also offer incentives to employees to get vaccinated or to provide documentation of vaccination “as long as the incentives are not coercive,” the EEOC said in a news […]