Blackbaud Settles for $3 Million Over 2020 Ransomware Disclosures
Cybersecurity3 min read

Blackbaud Settles for $3 Million Over 2020 Ransomware Disclosures

13 Mar 202313 Mar 2023 scworld.com

Blackbaud has agreed to a $3 million settlement with the SEC for misleading disclosures regarding a significant ransomware attack in 2020. This incident affected more than 13,000 customers and involved the unauthorized access of sensitive data.

Key Takeaways

  • 1.In a significant turn of events, Blackbaud, a company specializing in donor data management, has reached a $3 million settlement with the U.S.
  • 2."Blackbaud understood from the information available to it that the attacker exfiltrated at least a million files," the SEC’s findings elaborated.
  • 3.For instance, the quarterly report submitted to the SEC inadequately addressed the breach's extent, including misleading language such as "could adversely impact," which downplayed the reality that critical personal data had been compromised.

In a significant turn of events, Blackbaud, a company specializing in donor data management, has reached a $3 million settlement with the U.S. Securities and Exchange Commission (SEC). This financial penalty stems from accusations that Blackbaud provided misleading information related to a ransomware attack that occurred in 2020, impacting over 13,000 customers.

The ransomware incident marked one of the largest healthcare data breaches of that year, as the personal information of more than 10 million patients, along with data from several dozen provider organizations, was compromised. The attackers had access to the system for an extended period, going undetected for over three months, during which they stole a vast amount of sensitive information.

Initially, Blackbaud informed the public about the breach on July 16, 2020, asserting that attackers did not access critical financial information such as bank account details or Social Security numbers. The company described the breach as limited to names and contact information. However, the reality was much more alarming.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

By the Numbers

A subsequent filing with the SEC in September 2020 revealed that the attackers had actually accessed and stolen more sensitive data than previously disclosed. This included Social Security numbers, bank account details, and account credentials. "Blackbaud understood from the information available to it that the attacker exfiltrated at least a million files," the SEC’s findings elaborated.

"Blackbaud understood from the information available to it that the attacker exfiltrated at least a million files,"

On July 16, 2020, Blackbaud's internal investigation uncovered troubling communications from the attackers, indicating that they had indeed exfiltrated sensitive data pertaining to the company’s clients. Despite this revelation, the company failed to inform senior management responsible for public disclosures, leading to critical lapses in communication regarding the breach's severity.

Impact and Legacy

"As the order finds, Blackbaud failed to disclose the full impact of a ransomware attack despite its personnel learning that its earlier public statements about the attack were erroneous," explained David Hirsch, chief of the SEC Enforcement Division’s Crypto Assets and Cyber Unit.

"As the order finds, Blackbaud failed to disclose the full impact of a ransomware attack despite its personnel learning that its earlier public statements about the attack were erroneous,"

Impact and Legacy

The SEC’s investigation highlighted numerous deficiencies in Blackbaud’s disclosure protocols. For instance, the quarterly report submitted to the SEC inadequately addressed the breach's extent, including misleading language such as "could adversely impact," which downplayed the reality that critical personal data had been compromised. This lack of transparency frustrated both stakeholders and impacted parties.

"could adversely impact,"

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

Moreover, the report indicated that thorough analysis of the stolen information only occurred after a wave of customer complaints, prompting the company to re-evaluate and disclose the full scope of the damage. The SEC determined that Blackbaud’s insufficient internal controls contributed significantly to the misleading information provided to the public.

In the same announcement, Hirsch underscored the essential responsibility of public companies to share accurate and timely information with their investors, stating, "Public companies have an obligation to provide their investors with accurate and timely material information; Blackbaud failed to do so."

The SEC’s order revealed that Blackbaud breached multiple securities regulations, raising critical questions about the accountability of corporations in maintaining data security and transparency. This incident serves as a stark reminder to organizations about the importance of having robust cybersecurity strategies and clear disclosure protocols in place.

As Blackbaud settles the matter, the ramifications of this attack continue to ripple through the community affected by the breach. The need for stronger cybersecurity measures and transparent communication practices has never been more prominent, heralding a time when stakeholders will scrutinize the protocols of corporations more closely than ever before. Companies must now take heed of the obligation to protect their data—and their customers’ trust—which is paramount in sustaining business integrity moving forward.

More Stories