SunTrust Bank quietly announced Friday, April 20th, 2018 that a former employee was working with a “criminal third party” and may have passed along information from as many as 1.5 million client accounts.
Affected customers appear to be being notified by email with this message:
SunTrust cares deeply about your privacy and the security of your information. We became aware of potential theft by a former employee of information from some of our client contact lists, as we shared in a news release on Friday, April 20, 2018. We are still investigating in cooperation with law enforcement. We apologize that you are one of our clients who may have been affected, as your continued trust is critical to us.
Given this, we are proactively notifying you that certain information, including your name, address, phone number and certain account balances may have been affected. The contact lists did not include personally identifying information, such as your social security number, account number, PIN, User ID, password, or driver’s license number.
Your confidence is at the core of our purpose, and we want you to know that we have heightened our monitoring of your accounts and increased other related security measures. While we have not identified significant fraudulent activity, know that you will not be responsible for any fraud on your SunTrust accounts as a result of this incident.
At no cost to you, we recommend that you enroll in the IDnotify(tm) service provided by Experian(r) which includes:
* A personalized Experian credit report at signup;
* Experian Credit Monitoring for indicators of fraud;
* Dark Web monitoring;
* Identity Restoration specialists available for immediate help to address credit and non-credit related fraud; and
* $1 Million Identity Theft Insurance reimbursement for certain costs associated with a stolen identity event, subject to the terms of the policy.
To enroll in IDnotify:
* Log into your Online Banking account at www.suntrust.com and follow the instructions; or
* If you do not have an Online Banking account, please visit https://www.suntrust.com/identity-protection and follow the instructions.
To best protect your information, we recommend you consider additional steps that can be found here<https://www.suntrust.com/fraud-and-security-department>. You also will receive more information from SunTrust in the mail.
Protecting your information is a top priority for SunTrust, and we appreciate the opportunity to serve you.
Mark A. Chancy
You can probably expect no to very little follow up on this, ever. As always, one of the best things you can do to protect yourself is to freeze your credit. In this case, we’d recommend checking your balance every day along with recent transactions as well.
Remember, ACH and checking fraud do not carry the same protections as credit cards. Also, while SunTrust says that personally identifying information was not leaked it’s nearly impossible to know after the fact, which this finding appears to be.
Apple just announced a battery replacement program for certain 13 inch MacBook Pro’s (non touch bar) manufactured between October 2016 and October 2017.
Apple has determined that, in a limited number of 13-inch MacBook Pro (non Touch Bar) units, a component may fail causing the built-in battery to expand. This is not a safety issue and Apple will replace eligible batteries, free of charge. Affected units were manufactured between October 2016 and October 2017 and eligibility is determined by the product serial number.
You can see if your laptop is affected here. All managed services customers of JM Addington and Kairos Dynamic Digital Managed Services have already had their serial numbers run across the the program by JM Addington staff.
Find more reporting by Ars Technica here.
We recently came across this error, “A critical software update is required for your Mac.” Attempting to install this update would result in another error, “A critical software update is required for your Mac, but an error was encountered while installing this update.”
Unlike some others on the web we found that simply reinstalling the OS did not resolve the issue. However, booting into safe mode (left shift button while powering on) would work. From there, one can create a Time Machine backup. After we successfully backed up the machine we went into the recovery console (Apple+R on boot), ERASED the “Macintosh HD” partition and then re-installed.
This still prompted for the update but we were able to successfully install it. After a fresh install, Migration Assistant loaded the fresh Time Machine backup back onto the machine.
On Monday, September 18th, Cisco’s Talos reported that the popular computer cleaning utility, CCleaner, was found to distributing Malware for about the last month.
For a period of time, the legitimate signed version of CCleaner 5.33 being distributed by Avast also contained a multi-stage malware payload that rode on top of the installation of CCleaner. CCleaner boasted over 2 billion total downloads by November of 2016 with a growth rate of 5 million additional users per week.
For our managed services customers, we are actively uninstalled CCleaner and running clean up scans immediately. We highly recommend that anyone that does not have IT managed services actively monitoring and fixing this, uninstall CCleaner themselves (or contact us) and then follow up with an antivirus scan, such as Webroot or MalwareBytes.
At this point it is too early to know what impact the malware has had, if any. No early reports indicate that it was “activated” in a way to cause malicious actions on end computers. However, we expect to learn more over the next few days and may well discover that it has impacted specific organizations.
Scripting CCleaner Uninstall: http://www.itninja.com/blog/view/how-to-install-run-and-remove-ccleaner-silently-script-in-k1000