NEWYou can now take heed to Fox News articles!
Cybercriminals are glad to focus on virtually any trade the place knowledge may be stolen. In many instances, much less ready and fewer security-focused corporations are merely simpler targets.
A current ransomware attack on an organization tied to dozens of gas stations throughout Texas exhibits precisely how this performs out. The incident uncovered extremely delicate private knowledge, together with Social Security numbers and driver’s license particulars, belonging to a whole lot of hundreds of individuals.
The breach went undetected for days, giving attackers ample time to maneuver by inside programs and steal delicate knowledge. If you’ve got ever paid at the pump or shopped inside considered one of these comfort shops, that is the sort of incident that ought to make you cease and concentrate.
Sign up for my FREE CyberGuy Report
Get my finest tech suggestions, pressing safety alerts and unique offers delivered straight to your inbox. Plus, you will get on the spot entry to my Ultimate Scam Survival Guide – free while you be part of my CYBERGUY.COM publication.
What occurred within the Gulshan ransomware attack
According to a disclosure filed with the Maine Attorney General’s Office, Gulshan Management Services, Inc. reported a cybersecurity incident that impacted greater than 377,000 people. Gulshan is linked to Gulshan Enterprises, which operates round 150 Handi Plus and Handi Stop gas stations and comfort shops throughout Texas.
WINDOWS 10 USERS FACE RANSOMWARE NIGHTMARE AS MICROSOFT SUPPORT ENDS IN 2025 WORLDWIDE
The firm says it detected unauthorized entry to its IT programs in late September. Investigators later decided that attackers had been contained in the community for roughly ten days earlier than anybody seen. The intrusion started with a phishing attack, a reminder of how a single misleading e-mail can nonetheless open the door to huge breaches.
Ransomware assaults don’t simply hit tech corporations. Retailers like gas stations retailer delicate buyer and worker knowledge that criminals actively goal. (Kurt “CyberGuy” Knutsson)
During that window, the attackers accessed and stole private knowledge, then deployed ransomware that encrypted recordsdata throughout Gulshan’s programs. The compromised data contains names, contact particulars, Social Security numbers and driver’s license numbers. That mixture is very harmful, since it may be used for id theft, account takeovers and fraud that will floor months and even years later.
Why the shortage of a ransomware declare nonetheless issues
So far, no recognized ransomware group has publicly taken credit score for the attack. That would possibly sound like excellent news, but it surely doesn’t essentially change the chance for affected people. In many ransomware instances, silence can imply considered one of two issues. Either the attackers haven’t but posted stolen knowledge publicly, or the sufferer firm could have resolved the incident privately.
Gulshan’s submitting states that it restored its programs utilizing known-safe backups. That element usually suggests an organization selected to rebuild somewhat than negotiate with attackers. Even so, as soon as knowledge has been copied out of a community, there isn’t any strategy to pull it again. Whether or not the stolen data ever seems on-line, the publicity alone places affected individuals at long-term danger.
This incident additionally highlights a recurring sample. Retail and repair companies deal with enormous volumes of non-public knowledge however usually depend on legacy programs and frontline workers who’re prime phishing targets. Gas stations could not really feel like apparent hacking targets, however their cost programs, loyalty packages and HR databases make them helpful all the identical.
We reached out to Gulshan Management Services for remark concerning the breach, however didn’t obtain a response earlier than our deadline.
A buyer pumps gas at a gas station on Feb. 13, 2025, in Austin, Texas. (Brandon Bell/Getty Images)
10 steps you’ll be able to take to guard your self after a breach like this
If your data was uncovered on this breach or any related ransomware incident, there are concrete steps you’ll be able to take to cut back the fallout.
1) Monitor your credit score and id carefully
If the corporate affords free credit score monitoring or id safety, enroll in it. These companies can provide you with a warning early if somebody tries to open accounts or misuse your id. If nothing is obtainable, think about signing up for a good id theft safety service by yourself.
Identity Theft corporations can monitor private data like your Social Security Number (SSN), cellphone quantity, and e-mail deal with and provide you with a warning whether it is being bought on the darkish internet or getting used to open an account. They may help you in freezing your financial institution and bank card accounts to forestall additional unauthorized use by criminals.
See my suggestions and finest picks on tips on how to shield your self from id theft at Cyberguy.com.
2) Consider a private knowledge removing service
The much less of your data that is floating round knowledge dealer websites, the tougher it’s for criminals to focus on you. Data removing companies might help scale back your digital footprint over time.
While no service can assure the entire removing of your knowledge from the web, an information removing service is mostly a sensible selection. They aren’t low cost, and neither is your privateness. These companies do all of the be just right for you by actively monitoring and systematically erasing your private data from a whole lot of internet sites. It’s what provides me peace of thoughts and has confirmed to be the best strategy to erase your private knowledge from the web. By limiting the knowledge out there, you scale back the chance of scammers cross-referencing knowledge from breaches with data they could discover on the darkish internet, making it tougher for them to focus on you.
Even when no ransomware group claims duty, stolen knowledge can nonetheless gas id theft, fraud, and account takeovers lengthy after a breach happens. (Kurt “CyberGuy” Knutsson)
Check out my high picks for knowledge removing companies and get a free scan to search out out in case your private data is already out on the internet by visiting Cyberguy.com.
Get a free scan to search out out in case your private data is already out on the internet: Cyberguy.com.
3) Use a password supervisor
A password supervisor helps you create and retailer distinctive passwords for each account. If attackers attempt to reuse stolen knowledge to interrupt into your on-line accounts, sturdy, distinctive passwords can cease that try chilly.
Next, see in case your e-mail has been uncovered in previous breaches. Our No. 1 password supervisor decide features a built-in breach scanner that checks whether or not your e-mail deal with or passwords have appeared in recognized leaks. If you uncover a match, instantly change any reused passwords and safe these accounts with new, distinctive credentials.
FIBER BROADBAND GIANT INVESTIGATES BREACH AFFECTING 1M USERS
Check out the most effective expert-reviewed password managers of 2026 at Cyberguy.com.
4) Turn on two-factor authentication (2FA) in all places doable
2FA provides an additional barrier, even when somebody has your private particulars. Prioritize e-mail, banking, cloud storage, and buying accounts, since these are sometimes focused first.
5) Install and hold a powerful antivirus software program operating
Strong antivirus software program might help detect phishing makes an attempt, malicious downloads, and suspicious exercise earlier than it turns right into a full compromise. Keep real-time safety enabled and do not ignore warnings.
The finest strategy to safeguard your self from malicious hyperlinks that set up malware, doubtlessly accessing your personal data, is to have sturdy antivirus software program put in on all of your gadgets. This safety may provide you with a warning to phishing emails and ransomware scams, preserving your private data and digital belongings secure.
Get my picks for the most effective 2026 antivirus safety winners in your Windows, Mac, Android and iOS gadgets at Cyberguy.com.
6) Watch for phishing and follow-up scams
After breaches like this, scammers usually ship faux emails or texts pretending to be the affected firm or a credit score monitoring service. Slow down, confirm messages independently, and by no means click on hyperlinks you were not anticipating.
7) Review your credit score reviews often
Check your reviews from all major credit score bureaus for unfamiliar accounts or inquiries. You’re entitled to free reviews, and catching points early makes them a lot simpler to repair.
8) Freeze your credit score to cease new accounts from being opened
If criminals expose your Social Security quantity, place a credit score freeze as quickly as doable. A credit score freeze blocks lenders from opening new accounts in your title, even when thieves have your private particulars. The credit score bureaus supply freezes at no cost, and you’ll briefly carry one while you apply for credit score your self. This step stops id theft earlier than it begins, as an alternative of alerting you after the injury is completed. If you favor to not freeze your credit score, place a fraud alert as an alternative. A fraud alert tells lenders to confirm your id earlier than approving credit score, which provides one other layer of safety.
To study extra about how to do that, go to Cyberguy.com and search “How to freeze your credit.”
In the Gulshan attack, hackers spent days inside inside programs, stealing private knowledge earlier than deploying ransomware that locked down recordsdata. (Silas Stein/image alliance through Getty Images)
9) Protect your self from tax refund fraud with an IRS Identity Protection PIN
When Social Security numbers are stolen, tax fraud usually follows. Criminals can file faux tax returns in your title to steal refunds earlier than you ever submit your paperwork. An IRS Identity Protection PIN (IP PIN) helps stop this by guaranteeing solely you’ll be able to file a tax return utilizing your SSN. It’s a easy however highly effective safeguard that may block a typical type of id theft tied to knowledge breaches.
10) Lock down present financial institution and monetary accounts
Don’t simply watch for brand spanking new fraud, proactively safe the accounts you have already got. Enable alerts on financial institution and bank card accounts for big transactions, new payees, or adjustments to contact data. If your SSN or driver’s license quantity was uncovered, think about calling your financial institution to ask about extra protections or account notes. Acting early can stop small points from turning into major monetary issues.
Kurt’s key takeaway
Your private knowledge does not simply dwell with banks and hospitals. Retailers, gas stations, and comfort retailer operators additionally maintain data that may trigger actual hurt if it falls into the unsuitable palms. When attackers get in by one thing so simple as a phishing e-mail and keep undetected for days, the injury can unfold quick. You cannot stop these breaches your self, however you’ll be able to restrict how a lot energy stolen knowledge provides criminals by locking down your accounts and staying alert.
Do you assume on a regular basis companies like gas stations take cybersecurity severely sufficient? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my finest tech suggestions, pressing safety alerts and unique offers delivered straight to your inbox. Plus, you’ll get on the spot entry to my Ultimate Scam Survival Guide – free while you be part of my CYBERGUY.COM publication.
Copyright 2026 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of expertise, gear and devices that make life higher along with his contributions for Fox News & FOX Business starting mornings on “FOX & Friends.” Got a tech query? Get Kurt’s free CyberGuy Newsletter, share your voice, a narrative thought or remark at CyberGuy.com.
