Original Article Text

Click to Toggle View

Yacht giant MarineMax data breach impacts over 123,000 people. MarineMax, self-described as the world's largest recreational boat and yacht retailer, is notifying over 123,000 individuals whose personal information was stolen in a March security breach claimed by the Rhysida ransomware gang. The company operates over 130 locations, including 83 dealerships and 66 marinas and storage facilities worldwide. Last year, it reported $2.39 billion in revenue and a $835.3 million gross profit. While the Florida-based yacht seller initially stated in a March 12 SEC filing that no sensitive data was stored on the compromised systems, two weeks later, it said in a new 8-K filing that the attackers had stolen personal data belonging to an undisclosed number of people. This Tuesday, in breach notification letters filed with the Offices of Maine's and Vermont's Attorneys General, MarineMax revealed that the data breach impacts 123,494 individuals. It added that the incident was detected on March 10, ten days after the attackers gained access to its network, and it only impacted a "limited" number of systems. "Based on our investigation of the incident, we determined that an unauthorized third party obtained access to our environment from March 1, 2024 to March 10, 2024," MarineMax said. "Our investigation recently concluded, and it was determined that the unauthorized third party acquired some of our data, which contained your personal information." MarineMax also told the Maine and Vermont Attorneys General that the attackers had stolen names or other personal identifier information. Still, it has yet to disclose what other personal information was exfiltrated from its systems and if the data breach impacted both customers and employees. While the company didn't attribute the breach to a specific threat group, and it's still describing it as a "cybersecurity incident," the Rhysida ransomware gang claimed the attack on March 20. ​The cybercriminals have since published a 225GB archive of files allegedly stolen from MarineMax's network on their dark web leak site, representing what they claim to be data they couldn't sell. Rhysida also published what appear to be screenshots of MarineMax's financial documents, as well as customer or employee driver's licenses and passports. This relatively new ransomware-as-a-service (RaaS) operation surfaced almost one year ago, in May 2023, and quickly gained notoriety after breaching the Chilean Army (Ejército de Chile) and the British Library. The U.S. Department of Health and Human Services (HHS) also linked its affiliates to attacks targeting healthcare organizations, while CISA and the FBI warned that the Rhysida ransomware gang is also behind many opportunistic attacks targeting organizations across various industry sectors. For instance, it breached Sony subsidiary Insomniac Games in November and leaked 1,67 TB of documents on its leak site after the game studio refused to pay a $2 million ransom. More recently, the Singing River Health System warned that almost 900,000 people had their data stolen in an August 2023 Rhysida ransomware attack.

Daily Brief Summary

DATA BREACH // MarineMax Suffers Data Breach Affecting Over 123,000 Individuals

MarineMax, a leading boat and yacht retailer, reported a data breach impacting 123,494 people.

The breach was orchestrated by the Rhysida ransomware gang with unauthorized network access detected from March 1 to March 10, 2024.

Initial reports denied the presence of sensitive data on compromised systems; however, subsequent updates confirmed theft of personal data.

Data stolen includes names and possibly other sensitive personal identifiers; exact details of stolen data remain undetermined.

The breach has affected a "limited" number of systems, occurring after attackers gained access to MarineMax’s network.

MarineMax has reported the incident to the Attorneys General of Maine and Vermont as part of their legal reporting requirements.

The Rhysida gang has published 225GB of files online, claiming it represents data they couldn't sell, including financial documents and personal identity documents like driver's licenses and passports.

The breach contributes to Rhysida's growing notoriety, having previously targeted organizations such as the British Library and the Chilean Army.