Go offline with the Player FM app!
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
Manage episode 495743996 series 3645080
In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack was claimed by the BianLian ransomware group, which has shifted its strategy away from encryption to pure data theft and extortion.
Despite the scope of the breach, TADTS waited nearly a year to notify victims and has not offered free identity theft protection, even though the stolen data includes everything needed to commit large-scale identity fraud. In this episode, we unpack the incident, explore BianLian's evolving tactics, and highlight the regulatory and legal implications for companies that fail to secure consumer data.
You’ll learn:
- How BianLian transitioned from ransomware encryption to data-only extortion
- Why the IMSI data and biometric exposure raise the stakes for victims
- The technical tactics used by BianLian—custom backdoors, PowerShell abuse, RDP exploitation, credential dumping, and data syncing via tools like Rclone and Mega
- The alarming delay in breach disclosure—nearly 365 days late
- What Texas law and federal regulations require in such breaches—and whether TADTS violated them
- The class action lawsuit risks now emerging
- What individuals can do to defend themselves: credit freezes, fraud alerts, password changes, and monitoring
We also look at the broader cybersecurity implications: why sectors handling biometric and medical data must implement MITRE ATT&CK-aligned defenses, enforce multi-factor authentication, and maintain robust backup strategies to prevent and recover from modern extortion campaigns.
234 episodes
Manage episode 495743996 series 3645080
In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack was claimed by the BianLian ransomware group, which has shifted its strategy away from encryption to pure data theft and extortion.
Despite the scope of the breach, TADTS waited nearly a year to notify victims and has not offered free identity theft protection, even though the stolen data includes everything needed to commit large-scale identity fraud. In this episode, we unpack the incident, explore BianLian's evolving tactics, and highlight the regulatory and legal implications for companies that fail to secure consumer data.
You’ll learn:
- How BianLian transitioned from ransomware encryption to data-only extortion
- Why the IMSI data and biometric exposure raise the stakes for victims
- The technical tactics used by BianLian—custom backdoors, PowerShell abuse, RDP exploitation, credential dumping, and data syncing via tools like Rclone and Mega
- The alarming delay in breach disclosure—nearly 365 days late
- What Texas law and federal regulations require in such breaches—and whether TADTS violated them
- The class action lawsuit risks now emerging
- What individuals can do to defend themselves: credit freezes, fraud alerts, password changes, and monitoring
We also look at the broader cybersecurity implications: why sectors handling biometric and medical data must implement MITRE ATT&CK-aligned defenses, enforce multi-factor authentication, and maintain robust backup strategies to prevent and recover from modern extortion campaigns.
234 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.