TransUnion Details
TransUnion
Chicago, Illinois • employees • Technology
Industry
Technology
Security Incidents
1
TransUnion is a global leader in credit reporting, providing accurate and comprehensive credit information to businesses and consumers. They offer innovative solutions for credit risk management, fraud prevention, and customer acquisition. TransUnion's advanced data analytics help individuals and organizations make informed financial decisions and achieve greater economic opportunities.
Security Incidents
TransUnion Breach of Apr 2022
Show more
Severity Score
Moderate to Significant
Type
Data BreachSummary
In April 2022, TransUnion South Africa experienced a significant data breach orchestrated by a hacking group known as N4ughtySecTU. The threat actors gained unauthorized access to TransUnion's systems by exploiting a compromised administrative credential. The breach resulted in the exposure of personal information of approximately 54 million South African individuals, including names, ID numbers, and credit scores. The attackers demanded a ransom of $15 million in exchange for not releasing the stolen data. TransUnion promptly engaged cybersecurity experts to investigate the incident, enhance ...Show more
Severity
The TransUnion cyber security incident in April 2022 was severe as it compromised the personally identifiable information of approximately 200 million customers nationwide, including names, addresses, full Social Security numbers, and financial details. The incident was reported to the Massachusetts attorney general, indicating a significant breach of sensitive data.Impact
The breach had a major impact as more than 22 million Americans had their personally identifiable information exposed, including driver's licenses, passports, and Social Security numbers. This exposure could lead to potential fraud and identity theft, with government agencies likely to be affected by criminals using the stolen information for malicious activities.KEEP YOUR ENVIRONMENT SECURE
Weak credentials are the leading cause of breaches. Beyond Identity can help.
See MFA exploits in action
Watch how adversaries exploit companies in quick videos