Pfizer disclosed this month that the Social Security numbers and other personal data of about 17,000 of its current and former workers were exposed after an employee installed unauthorized file-sharing software on a company laptop provided for use at her home.Data on about 15,700 of the workers was actually accessed and copied off the laptop by an unknown number of people on a peer-to-peer (P2P) network, New York-based Pfizer said in letters that it sent to affected employees and to state attorneys general.Pfizer officials didn’t respond to a request for comment this week. But copies of the pharmaceutical company’s letters were posted on the website of the New Hampshire attorney general’s office, and the office of Connecticut Attorney General Richard Blumenthal posted a response that he sent to a Pfizer attorney on June 6.In his letter, Blumenthal noted that 305 Connecticut residents were among the affected employees. He asked the company to provide additional information by this Friday, including when it discovered the breach, how it responded and what kind of measures it had in place prior to the breach to protect against data compromises.The letter that Pfizer sent to the 17,000 individuals—which was dated June 1 and signed by Lisa Goldman, its general counsel—didn’t specify when the file-sharing software was installed on the laptop or how the company discovered the data breach. But the letter did say that Pfizer reclaimed the laptop and disabled the file-sharing program immediately after discovering the breach. Goldman added that because the laptop was being used to access the Internet from outside of Pfizer’s network, no other data was compromised.Stark exampleThe report was based on searches of P2P networks such as Gnutella, FastTrack, eDonkey and BitTorrent for traffic that mentioned the names of the top 30 U.S. banks or mapped to a specific digital footprint that Dartmouth created for each bank.The data, which was gathered during a seven-week period from December to February, showed that a large number of people were inadvertently exposing bank account data and other personal information stored on their computers to fellow users on the P2P networks, said Eric Johnson, a professor of operations management at Tuck’s Center for Digital Strategies.Johnson, the report’s author, said the data gathered also indicated that cybercrooks were lurking on P2P networks to harvest the financial data of users via targeted searches.Data can be exposed in several ways, said Johnson. For instance, if a music file is accidentally dropped into a folder containing sensitive data, the entire folder could end up being made available on a P2P network without the user’s knowledge, via wizards in file-sharing clients that can scan PCs and recommend folders containing media files for sharing.”In many cases, [P2P users] are sharing the contents of their entire hard drive, with all sorts of information,” Johnson said. And it isn’t just home users who are at risk, he added. About 20 percent of the data analyzed in the Dartmouth study came from users at banks or their partners, Johnson said. The incident at Pfizer serves as a stark example of the potential security dangers presented by peer-to-peer software—dangers that were highlighted in a report released June 4 by Dartmouth College’s Tuck School of Business.—Jaikumar Vijayan, Computerworld (US) Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe