Ransomware, Incident Response
Accellion claims no ‘guarantee’ of security in $8.1M breach settlement

White House Press Secretary Jen Psaki looks on as Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger speaks during a press briefing at the White House in February. The Accellion incident kicked off a number of supply chain hacks in 2021, including Microsoft Exchange and SolarWinds, prompting White House action. (Photo by Drew Angerer/Getty Images)
Accellion reached an $8.1 million settlement in its class-action data breach lawsuit with the approximately 9.2 million individuals impacted by the monthslong hack of its file transfer application, which resulted in the theft of both consumer and patient data. Details of the lawsuit paint a clear message from the vendor that users were solely responsible for their own security, despite flaws in the software that left them vulnerable.Hundreds of companies were affected, with the healthcare sector among the most impacted sectors. Accellion was the largest healthcare data breach of 2020, impacting 3.51 million patients from Centene, Kroger, Trinity Health, and a host of other provider organizations.The lawsuit stemmed from the December 2020 exploit of several unpatched, zero-day vulnerabilities in the Accellion FTA, which allowed the threat actors to pivot into connected client networks and steal massive troves of personal and protected health information.The motives behind the attack were initially unclear. By January 2021, multiple Accellion clients began to receive extortion emails directly from Clop hackers threatening to leak the data exfiltrated from the FTA. At least 100 companies from all sectors were impacted by the mass extortion effort, with some of the stolen data leaked online. The breach victims soon responded with lawsuits against Accellion and multiple impacted clients. The lawsuits made serious allegations against Accellion, including failure to implement adequate security practices, failure to detect the vulnerabilities behind the exploit, and failure to “disclose that their data security practices were inadequate to safeguard” data.“Accellion has denied all of the allegations and any liability and maintains that it did not owe a legal duty of care to [individuals] and acted reasonably,” according to the settlement proposal. Customers were responsible for managing their FTA instances, and the vendor does not manage or collect any data on behalf of its customers.Further, the proposal asserted that “Accellion did not guarantee the security of the FTA software to customers. Its standard license agreement disclaimed such guarantees and included a broad limitation of liability for any damages resulting from a data breach.”Thus, their argument is that clients were “solely responsible and liable for the use of and access to” the FTA software. Since the initial hack, ongoing industry discussions have centered around concerns the vendor was continuing to market its FTA, despite the known security flaws.Accellion stopped licensing the FTA to new customers in 2016, but allowed previous customers to renew existing licenses. As such, the last security update for the vulnerable FTA was issued in February 2019. The settlement proposal explained Accellion performed five security scans and pen tests on the FTA after that date, the last in June 2020.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds