According to sources, Hershey (a Critical Infrastructure organization in Pennsylvania) was hit with a cyber attack. It was first reported on 2023-12-04.

If You're in Pennsylvania, You're at Increased Risk

Cybersecurity for Critical Infrastructure

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-12-04

Chocolate maker Hershey breached in phishing attack

“Hershey, one of the world’s largest chocolate makers, is investigating a phishing attack during which malicious actors obtained a “limited number of Hershey email accounts,” together with sensitive personal information such as credentials and financial accounts. “

“At least 2214 individuals were affected when an unauthorized hacker gained access to the accounts, the company’s filing with the Maine Attorney General reveals. “

“The breach happened on September 3rd. It was immediately discovered and lasted two days. A single Maine citizen was affected. “

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Guarding Against Phishing

  • December 13, 2017

    New Insights: The 2016 Thanksgiving Cyber Attack

  • July 26, 2017

    How Hackers Infiltrate Our Public Safety Infrastructure

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis