Skip to main content

You may be a victim in one of the worst data breaches in history

Background check company National Public Data — also known as Jerico Pictures — suffered what is reportedly one of the most significant data breaches in history, affecting 2.9 billion personal records that leaked sensitive data such as Social Security numbers and more, as mentioned in a class-action lawsuit document and sourced by Bloomberg Law. What’s even worse is that it’s not known how the breach happened in the first place — or who has been included in it.

Before getting into it, it’s worth noting that National Public Data has not confirmed the breach yet, so there’s a lot of information that’s only coming from the lawsuit or the hacking group. That means some of the figures will need to be taken with a grain of salt. Still, it doesn’t sound good.

Recommended Videos

The lawsuit indicates that critical data, such as addresses, full names, and relative information, have reportedly been leaked to the dark web. The data even includes information on deceased relatives dating back decades.

The lawsuit also claims that the National Public Data scraping data from non-public sources to conduct personal background checks. The process used reveals that many users were unaware that the company possessed this information in the first place.

According to the lawsuit, an identify-theft protection service provider notified affected user Christopher Hofmann of the leak on or around July 24, though they believe the breach may have occurred in April. By the time the service informed him, his and potentially billions of others’ info was already up for sale for $3.5 million by the cybercriminal group USDoD on a dark web database.

The class action lawsuit accuses NPD of unjust enrichment, negligence, third-party beneficiary, and breaches of fiduciary duty. The lawsuit also demands that NPD conduct database scanning, segment data, use a threat-management system, and hire a third-party assessor annually to evaluate its cybersecurity frameworks for the next 10 years. The court has also asked NPD to cleanse the personal data of all those affected and encrypt all gathered data from now on.

This could be the most significant data breach since the 2013 Yahoo breach, where the personal data of 3 billion users was leaked. To help stay safe, we recommend using one of the best identify-theft protection service providers on the market.

Judy Sanhz
Computing Writer
Judy Sanhz is a Digital Trends computing writer covering all computing news. Loves all operating systems and devices.
Google Drive, iCloud, or OneDrive: Which cloud storage is most private and secure?
Google Drive, iCloud, and OneDrive are open on a PC monitor.

Cloud storage is convenient, syncing your files and photos between devices, but is it secure enough to keep your data safe? And how much private information are you sharing when you use Microsoft OneDrive, Apple iCloud, and Google Drive?

If you’re paying for the best antivirus software to protect your computer, you want to safeguard your data that’s in the cloud. Likewise, the best VPNs hide your identity, but some cloud storage providers lack the end-to-end encryption that ensures privacy.
Cloud security

Read more
Hyundai Insteroid is a one-off we really want, but may not get
Hyundai Insteroid

The Hyundai Insteroid is an eye-melting example of what can be generated when designers are allowed to have some fun.

This takes the Hyundai Inster EV, and turns that city-hopping micro-motor into a fully tuned performance machine that looks as fast as it does confident and charismatic.

Read more
Hackers are using AI to breach systems faster than ever
A person using a laptop with a set of code seen on the display.

AI is helping hackers breach systems faster than ever and in under an hour, according to new research from ReliaQuest. The report also indicates that hackers are shifting from ransomware to data theft, making attacks harder to detect and defend against. Phone-based and phishing scams are also rising, making businesses rethink their security strategies to protect sensitive information.

The report found that hackers are moving away from ransomware and focusing on selling stolen data rather than demanding ransoms, as it is more profitable. 80% of breaches involve data theft, while only 20% include data encryption. This change implies companies are less likely to pay the ransom, as only around 7% recover their data. Phishing is currently the top way hackers steal data, with 30% of attacks including credentials theft. As attackers use AI, it only takes them four hours to steal the data and six hours to encrypt it.

Read more