{
	"id": "2e9e73ef-4f9c-4634-8576-4d5f19ac2956",
	"created_at": "2026-04-06T00:10:16.68956Z",
	"updated_at": "2026-04-10T03:20:58.300752Z",
	"deleted_at": null,
	"sha1_hash": "fae898eec9a6dda9b2f5597b85668bcff966bc38",
	"title": "Data breach exposes 1.6 million Washington unemployment claims",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1404459,
	"plain_text": "Data breach exposes 1.6 million Washington unemployment claims\r\nBy Lawrence Abrams\r\nPublished: 2021-02-01 · Archived: 2026-04-05 13:55:55 UTC\r\nWashington's State Auditor office has suffered a data breach that exposed the personal information in 1.6 million\r\nemployment claims.\r\nThe Office of the Washington State Auditor (“SAO”) states that they suffered a data breach after a threat actor exploited a\r\nvulnerability in a secure file transfer service from Accellion.\r\n\"SAO is advised that an unauthorized person was able to exploit a software vulnerability in Accellion’s file transfer service\r\nand gain access to files that were being transferred using Accellion’s service. Accellion stated that they believe the\r\nunauthorized access occurred in late December of 2020.\"\r\nhttps://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"Other customers of this Accellion service were similarly impacted. SAO is currently seeking a full understanding of the\r\ntimeline of the incident and the status of Accellion’s investigation and the investigation by law enforcement. At this time,\r\nSAO does not have enough information to draw conclusions about the timing or full scope of what took place.\"\r\n\"It was not until the week of January 25, 2021, that Accellion confirmed to SAO that SAO files were subject to this attack\r\nand provided the information needed for SAO to begin to identify which data files were impacted and individuals whose\r\npersonal information is in those files,\" SAO stated in a security breach notification posted to their website.\r\nThe exposed claims were in data files from the Employment Security Department (ESD) and contain sensitive personal\r\ninformation of Washington residents.\r\n\"These ESD data files contained unemployment compensation claim information including the person’s name, social\r\nsecurity number and/or driver’s license or state identification number, bank account number and bank routing number, and\r\nplace of employment,\" the breach notification explains.\r\nIn addition to unemployment claims, the breach exposed files from some Washington local governments and other state\r\nagencies were also affected.\r\nThe SAO is still investigating what information is contained in these files.\r\nZero-day responsible for December attacks\r\nAccellion is a provider of secure file transfer services that allow organizations to securely share sensitive documents with\r\nusers outside their organization. This service is popular among banks, government agencies, and financial organizations that\r\ncommonly share sensitive documents with external users.\r\nAccellion stated that they became aware of an actively exploited zero-day vulnerability in their legacy FTA solution in mid-December, and a patch was deployed to all customers.\r\nBleepingComputer later learned from one of Accellion's customers that the modern secure file sharing service, Accellion\r\nKiteWorks, also received a security update in December 2020. Accellion has not responded to our questions regarding this\r\nupdate.\r\nUnfortunately, numerous organizations were breached before they could deploy the patch for this vulnerability, including the\r\nReserve Bank of New Zealand, the Australian Securities and Investments Commission (ASIC), and the Harvard Business\r\nSchool.\r\n\"In late December, Harvard Business School (HBS) was informed by one of its vendors of a vulnerability in the vendor’s\r\nsoftware. HBS applied a patch supplied by the vendor to resolve the vulnerability. On December 29, 2020, the vendor\r\nnotified HBS that it had identified unauthorized access to certain HBS files.\"\r\n\"HBS immediately launched an investigation and determined that files containing personal information were downloaded by\r\none or more unauthorized third parties between December 21 and December 23, 2020,\" the Harvard Business School told\r\nBleepingComputer in a statement.\r\nSources in the cybersecurity industry have told BleepingComputer that Accellion's software's vulnerability also caused the\r\nHarvard Business School breach.\r\nWith Accellion being a popular service used by numerous organizations, we should expect to see a steady trickle of similar\r\nbreaches revealed soon.\r\nhttps://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/\r\nhttps://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/data-breach-exposes-16-million-washington-unemployment-claims/"
	],
	"report_names": [
		"data-breach-exposes-16-million-washington-unemployment-claims"
	],
	"threat_actors": [],
	"ts_created_at": 1775434216,
	"ts_updated_at": 1775791258,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fae898eec9a6dda9b2f5597b85668bcff966bc38.pdf",
		"text": "https://archive.orkl.eu/fae898eec9a6dda9b2f5597b85668bcff966bc38.txt",
		"img": "https://archive.orkl.eu/fae898eec9a6dda9b2f5597b85668bcff966bc38.jpg"
	}
}