Blackbaud penalised $3M for not disclosing the full scope of ransomware attack

Blackbaud penalised $3M for not disclosing the full scope of ransomware attack

The company detected unauthorised access to its systems in May 2020 that impacted 13,000 customers.

Credit: Dreamstime

Software firm Blackbaud has agreed to pay a $3 million penalty for failing to disclose the full scope of the ransomware attack it suffered in 2020, according to the US Securities and Exchange Commission (SEC).

South Carolina headquartered Blackbaud provides donor relationship management software to various non-profit organisations, including charities, higher education institutions, K-12 schools, healthcare, religious, and cultural organisations.

The company detected unauthorised access to its systems on May 14, 2020, which impacted 13,000 customers. On July 16, 2020, Blackbaud announced that the ransomware attacker did not access donor bank account information or social security numbers.

However, in its order last week, SEC found that Blackbaud personnel were aware that the attacker also accessed bank account information and social security numbers but the company failed to inform the same to authorities and customers.

Without admitting or denying the SEC findings, Blackbaud agreed to cease and desist from committing violations of these provisions and to pay a $3 million civil penalty, the SEC said in a press statement.

“As the order finds, Blackbaud failed to disclose the full impact of a ransomware attack despite its personnel learning that its earlier public statements about the attack were erroneous,” David Hirsch, chief of the SEC enforcement division’s crypto assets and cyber unit, said in a statement. “Public companies have an obligation to provide their investors with accurate and timely material information; Blackbaud failed to do so.”

Ransomware attack began in Feb 2020

Blackbaud detected the ransomware attack in May 2020, but the attack had begun in February of the same year. The company personnel found messages from the attacker in the company’s system claiming to have exfiltrated data relating to Blackbaud’s customers, and subsequently demanding payment.

Blackbaud along with a third-party cybersecurity firm investigated the incident. The company also engaged in communications with the attacker to coordinate the payment of a ransom in exchange for the attacker’s promise to delete the exfiltrated data.

By July 16, 2020, the company analysed the exfiltrated file names to identify which products and customers were impacted. However, the company did not analyse the content of any of the exfiltrated files, the SEC order said.

Blackbaud found that the attacker had exfiltrated at least a million files and based on the file name review, the company identified over 13,000 impacted customers and multiple impacted products, including various versions of the company’s donor relationship software.

The company announced the incident for the first time on its website on July 16, 2020, and sent notices to impacted customers claiming the cybercriminals did not access bank account information or social security numbers. However, by the end of the same month, company personnel learned that the attacker had, in fact, accessed donor bank account information and social security numbers in an unencrypted form for a number of the impacted customers, the SEC order said. 

“Although the company’s personnel were aware of the unauthorised access and exfiltration of donor bank account numbers and social security numbers by the end of July 2020, the personnel with this information about the broader scope of the impacted data did not communicate this to Blackbaud’s senior management responsible for disclosures, and the company did not have policies or procedures in place designed to ensure they do so,” the SEC order said. 

Series of non-disclosure

Blackbaud has been accused of a series of non-disclosures by the SEC. In a regulatory filing in August 2020, Blackbaud said, “the cybercriminal removed a copy of a subset of data.”

In the same regulatory filing, the company made no reference to the attacker removing any sensitive donor data, and made no mention of the exfiltration of donor social security numbers and bank account numbers, the SEC order said. 

“This statement omitted the material fact that a number of customers had unencrypted bank account and social security numbers exfiltrated, in contrast to the company’s unequivocal, and ultimately erroneous claims in the July 16, 2020, website post and customer notices,” the SEC order noted. 

“A compromise of our data security that results in customer or donor personal or payment card data being obtained by unauthorised persons could adversely affect our reputation with our customers and others, as well as our operations, results of operations, financial condition and liquidity and could result in litigation against us or the imposition of penalties,” Blackbaud said in a section of the August 2020 filing that talked about cybersecurity risks.

This statement also omitted the material fact that such data was in fact exfiltrated by the attacker, which entailed that the risks of such an attack on the company’s business were no longer hypothetical.

It was only on September 29, 2020 that Blackbaud furnished another statement to the regulator concerning the incident and acknowledged for the first time that “the cybercriminal may have accessed some unencrypted fields intended for bank account information, social security numbers, usernames, and/or passwords.” 

The company also sent notices to customers that Blackbaud believed had such sensitive donor information accessed and exfiltrated. 

The SEC investigation also found that the company did not have controls or procedures designed to ensure that information relevant to cybersecurity incidents and risks were communicated to the company’s senior management and other disclosure personnel.

Follow Us

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.



How MSPs can capitalise on integrating AI into existing services

How MSPs can capitalise on integrating AI into existing services

​Given the pace of change, scale of digitalisation and evolution of generative AI, partners must get ahead of the trends to capture the best use of innovative AI solutions to develop new service opportunities. For MSPs, integrating AI capabilities into existing service portfolios can unlock enhancements in key areas including managed hosting, cloud computing and data centre management. This exclusive Reseller News roundtable in association with rhipe, a Crayon company and VMware, focused on how partners can integrate generative AI solutions into existing service offerings and unlocking new revenue streams.

How MSPs can capitalise on integrating AI into existing services
Access4 holds inaugural A/NZ Annual Conference

Access4 holds inaugural A/NZ Annual Conference

​Access4 held its inaugural Annual Conference in Port Douglass, Queensland, for Australia and New Zealand from 9-11 October, hosting partners from across the region with presentations on Access4 product updates, its 2023 Partner of the Year awards and more.

Access4 holds inaugural A/NZ Annual Conference
Show Comments