Oh $%&@ - RE Data compromised

Options
Maybe you are lucky and didn't receive the email this morning at 10:30 AM EST / 7:30 AM PST but I sure did. Apparently Blackbaud hosting had a ransomware attack in May. You can see details from Blackbaud and news. My problem is this particular section:
ab737896701dbe5bbfd0e46d153b0489-huge-bl

I don't know that I agree with this statement. I feel I have to now notify everyone in my RE DB that their PII may have been compromised. What are your thoughts?
«13

Comments

  • JoAnn Strommen
    JoAnn Strommen ✭✭✭✭✭
    Ancient Membership Facilitator 4 Name Dropper Photogenic
    First I've heard of the issue. Whew!  Will check with CEO/CFO to see if they received email. 


    That's a tough call. Not sure how they can be sure that info was not compromised. Don't know what we'd do in that situation. If you feel need to notify, perhaps just those who have credit card/bank info on their records. 


    Best wishes.
  • JoAnn Strommen
    JoAnn Strommen ✭✭✭✭✭
    Ancient Membership Facilitator 4 Name Dropper Photogenic
    Well, now we got the email.  Reading through the resources and contacting other staff to determine plan of action needed.
  • Received the email early this morning, and I have a question I hope someone can help me with.

    My version of the letter stated that an NXT backup was affected (i.e., copied, stolen), and that no credit card numbers or account numbers were stolen because they are encrypted. In my Database view, that is true for credit cards. However, donors who made donations through their debit card have a Bank Relationship record in their Relationships tab, and that relationship record contains unencrypted routing and account numbers for their checking accounts. But when I look at the gift's debit information in NXT, the account number is encrypted (well, tokenized).


    So my question is, if the attacker only had access to the NXT backup, did s/he have access to these routing and account numbers? Any thoughts would be appreciated!
  • Hi all,


    I'm having a hard time figuring out what information WAS compromised. Does anyone know the answer? I'm assuming all unencrypted fields apply here? DOB, email, phone, etc.


    Thanks, 

    Jessica
  • Morally I feel we need to notify people on our database, legally is a different issue.


    There has been a data breach, if there are further repercussions( the data re-surfaces, peoples identifies cloned/used etc.) 

    then data subjects could quite rightly come after you. 


    Thoughts? 
  • Huw Price:

    Morally I feel we need to notify people on our database, legally is a different issue.


    There has been a data breach, if there are further repercussions( the data re-surfaces, peoples identifies cloned/used etc.) 

    then data subjects could quite rightly come after you. 


    Thoughts? 

    Huw, if you're based in the UK then I think you will be legally obliged to under GDPR (and report the breach to the ICO). But I've not seen the email from Blackbaud as we're self-hosted.


    Matt

  • Hi Matt


    Thank you for your thoughts. It was system backups
    that were stolen - all financial information would have been
    encrypted by default...



    This is where opinions may come into play: "Does
    the data taken pose a significant risk to the identities and
    security of the data subjects?" 



    Until I find out the exact details of data taken
    I'm unable to give a balanced opinion. 



    I'm (still!) waiting for a response from
    Blackbaud... 



    Thank again. 





    
    


    This
    email and any files transmitted with it are confidential and
    intended solely for the use of the individual or entity to whom
    they are addressed. If you have received this email in error please
    notify the system manager. This message contains confidential
    information and is intended only for the individual named. If you
    are not the named addressee you should not disseminate, distribute
    or copy this e-mail. Please notify the sender immediately by e-mail
    if you have received this e-mail by mistake and delete this e-mail
    from your system. If you are not the intended recipient you are
    notified that disclosing, copying, distributing or taking any
    action in reliance on the contents of this information is strictly
    prohibited.



    WARNING: Computer viruses can be transmitted via email. The
    recipient should check this email and any attachments for the
    presence of viruses. St Leonards School accepts no liability for
    any damage caused by any virus transmitted by this email. E-mail
    transmission cannot be guaranteed to be secure or error-free as
    information could be intercepted, corrupted, lost, destroyed,
    arrive late or incomplete, or contain viruses. The sender,
    therefore, does not accept liability for any errors or omissions in
    the contents of this message, which arise as a result of e-mail
    transmission.



    The
    School is a private company limited by guarantee and is registered
    in Edinburgh with registration number SC016693.



    The
    company's registered office address is St Leonards School, St
    Andrews, Fife KY16 9QJ.



    The
    School is also registered as a charity with
    OSCR. 



    The
    charity registration number is SC010904.



  • I'm having a hard time figuring out what information WAS compromised. Does anyone know the answer? I'm assuming all unencrypted fields apply here? DOB, email, phone, etc.

     

    Anything in the RE DB, they copied the entire DB which is an SQL file that can be loaded up and searched if you know what you are doing. There shouldn't be CC or Bank info in RE, that is to say I have seen people put things they shouldn't be in it. The one question is the one in this thread about some routing info which may be stored somewhere else and integrated into NXT at view time rather than stored in RE DB.

  • Our notice from Blackbaud said a backup copy of our Research Point Database was part of the incident. Microsoft Azure, which is were our RE NXT is located is not part of the incident.
  • I am happy to find this discussion.  I wasn't able to access the community forum this morning and have had minimal luck reaching someone in support today.  Our organization also received the data breach email last week.  We have also struggled to find out exactly what information was affected as that will determine how (or if) we notify our constituents.We spoke with someone at the "hotline" number Blackbaud provided and gave them some questions we had to forward to Blackbaud.  As already mentioned, this is a third-party company fielding the calls and yes, all they do is regurgitate the same information Blackbaud emailed last Thursday.  We have reached out to our Account Executive as well but were directed to customer support as she did not have any information.  We also sent an email directly to Customer Success and received a response this morning.  They also repeated what was in the email Blackbaud sent last Thursday.  It's very frustrating.


    We keep getting told that we need to look at our product database for a list of fields that are not encrypted to see what may have been compromised.  Does that mean I need to look at the tables in Query/Export for a list of those fields?  I'm assuming the product database they mention is our live database.  However, the knowledgebase articles I have found regarding "product database" seem to refer to self-hosted versions of Raiser's Edge.  Again, it's been frustrating trying to figure out where to look for specifics.  Am I missing something or is anyone else as confused as I am?
  • Dariel Dixon 2
    Dariel Dixon 2 ✭✭✭✭✭
    Seventh Anniversary Facilitator 4 Name Dropper Photogenic
    Robyn Halbert‍ We haven't used ResearchPoint for our grateful patient solution, so we don't have any PHI in our product.  Granted, if you have an automatic feed from your EHR system, you might want to consider what fields the protected data is coming through as.  If you have a BAA with Blackbaud, you may want to consider taking a look at it.
  • Have to agree with Stacey Brake - I'm very confused by what of my data was compromised.  And it doesn't help that my database manager has been out for over 2 months and this isn't my area of expertise.  I've asked for the 'data schema' which is basically the list of potential fields of data entry that could have been accessed by the cyber criminal but am waiting on Blackbaud to reply.  I don't know what of my own data is encrypted or not; thankfully we don't have any banking, health or other truly personal security info so I think we're okay.  But with donors across the US, I've been reading state law codes until my eyes are overstrained and blurry.  

    If anyone has a shortcut idea of how to find the list of fields from your own database (our NXT backup was hacked) that are unencrypted, then please share!  I will be eternally grateful.

    Meg - 
  • I reached out to my Account Rep who created a case on my behalf. I have requested a backup copy of my database so I can see exactly what fields were compromised. This has yielded the best results so far but the path has been long and tedious. 


    I swear if someone from Blackbaud tells me one more time that encrypted fields weren't compromised, I'm going to lose my mind.
  • Hi Meg,


    List of encrypted fields from blackbaud's knowledgebase: https://kb.blackbaud.com/articles/Article/47633?_ga=2.180561831.1225762633.1595263300-1691160020.1594746434 (if you aren't using RE, you can search "what fields are encrpyted in [your solution] in the knowledgebase) So my understanding is all the other fields are not encrypted (essentially most of them), meaning most fields fall into the possibly compromised category.


    I hope that is helpful. If anyone has any other understanding, please chime in.
  • https://kb.blackbaud.com/articles/Article/57547


    Has anyone seen a better response than the linked KB for "What fields are encrypted in Blackbaud Net Community?" - because the question + answer don't seem to match on that page.


    From what I understand:

    - The ransomware affected full backups, not the delta of a backup (which would only be changed/new)

    - The "full backup" of Raiser's Edge should be the same as the live Raiser's Edge on the day that it was backed up. I don't remember how often BB does backups of their hosted clients.

    - The backup data that got caught up in the ransomware attack was from between February and May 2020 - May is when the ransomware attack occurred, but they may have had access to data as early as February, so I'm presuming that there were some stored backups from then.

    - Only the fields specifically listed in https://kb.blackbaud.com/articles/Article/47633 (for RE/FE) were encrypted or stored elsewhere. Every single other field in RE was involved.


    My assumptions:

    - This was similar to the attack on the University of California earlier this spring.

    - Blackbaud is trying to downplay the seriousness of the issue by not giving us an idea of how many organizations are affected. Knowing the scope of this would be really helpful for communicating with our donors!


    I'm still trying to work out whether or not we need to disclose the databreach to our constituents based on the risk of harm, but I think that will require meeting with our legal team? It's unclear to me whether or not the risk etc is fully mitigated, though the Webcast from Ted Claypoole from Womble Bond Dickson was helpful in having a place to start from, regarding the laws.
  • Thank you Bill Connors for the information.  Do you have a different link though?  I tried the one posted but it takes me to Facebook asking if I want to follow the link elsewhere.
  • Hmm, sorry, they work for me.  But here they are directly:

    https://www.blackbaud.com/docs/default-source/how-to-documentation/raisers-edge-how-to/raisers-edge-user-guides-administration/import.pdf

    https://kb.blackbaud.com/articles/Article/47633


    Also, Stacey, I just edited my earlier post, so please see the edit as well.
  • Thank you Bill Connors!
  • This situation is very upsetting a I am wondering if anyone else in Australia received the notification?  
  • Julie Rae:

    This situation is very upsetting a I am wondering if anyone else in Australia received the notification?  

    Yes we have as well Julie.  Hello by the way.

Categories