Company Details
atlantic-coast-life-insurance-company
29
437
524
atlanticcoastlife.com
0
ATL_1860843
In-progress


Atlantic Coast Life Insurance Company Company CyberSecurity Posture
atlanticcoastlife.comAtlantic Coast Life Insurance Company is an insurance company based out of Charleston, South Carolina.
Company Details
atlantic-coast-life-insurance-company
29
437
524
atlanticcoastlife.com
0
ATL_1860843
In-progress
Between 650 and 699

ACLIC Global Score (TPRM)XXXX

Description: Atlantic Coast Life Insurance Company Suffers Data Breach, Exposing Sensitive Customer Information Atlantic Coast Life Insurance Company, a Charleston, South Carolina-based provider of annuities and life insurance since 1925, is under investigation following a data breach that exposed sensitive customer information. The incident was discovered on April 15, 2025, after suspicious activity was detected on the company’s systems. An unauthorized actor accessed files containing personally identifiable information (PII) between April 7 and April 15, 2025. The exposed data includes: - Names - Social Security numbers - Individual taxpayer identification numbers - Financial account details - Dates of birth - Medical or health insurance information The company completed its review of affected files by December 17, 2025, and began notifying impacted individuals. Those whose data was compromised are being offered one year of free credit monitoring and identity restoration services through IDX. Affected customers can also take steps such as reviewing financial accounts, placing fraud alerts or credit freezes, and reporting suspected identity theft to authorities. Law firm Shamis & Gentile P.A. is investigating potential legal claims on behalf of affected individuals, who may be eligible for compensation. Customers who did not receive a notification but believe their data was exposed can contact the assistance line at 844-419-5502 for support. Atlantic Coast Life Insurance is part of the A-CAP family of companies, which includes Sentinel Security Life and is owned by Advantage Capital Partners LLC.


No incidents recorded for Atlantic Coast Life Insurance Company in 2026.
No incidents recorded for Atlantic Coast Life Insurance Company in 2026.
No incidents recorded for Atlantic Coast Life Insurance Company in 2026.
ACLIC cyber incidents detection timeline including parent company and subsidiaries

Atlantic Coast Life Insurance Company is an insurance company based out of Charleston, South Carolina.


Somos la empresa aseguradora multirramo 100% mexicana de mayor experiencia y solidez de nuestro país. Por más de 116 años hemos protegido a las familias mexicanas, respaldando sus sueños, historias, emociones y vivencias. Estamos orgullosos de formar parte de uno de los conglomerados empresariales

Brown & Brown delivers risk management solutions to help protect and preserve what our customers value most. Our two business segments, Retail and Specialty Distribution, offer businesses and individuals a wide range of insurance solutions. We are one of the insurance industry’s most powerful and i

Nationwide, a Fortune 100 company based in Columbus, Ohio, is one of the largest and strongest diversified insurance and financial services organizations in the United States. Nationwide is rated A+ by Standard & Poor's. An industry leader in driving customer-focused innovation, Nationwide provides

For more than 90 years, American Family Insurance has built its reputation on sound principles. We strive to provide you industry-leading service, exceptional claims experience and products that build long-term relationships. This is accomplished by treating policyholders fairly in a helpful and car

HDFC ERGO General Insurance Company Limited was promoted by erstwhile Housing Development Finance Corporation Ltd. (HDFC), India’s premier Housing Finance Institution and ERGO International AG, the primary insurance entity of Munich Re Group. Consequent to the implementation of the Scheme of Amalgam

Vienna Insurance Group (VIG) is the leading insurance group in the entire Central and Eastern European (CEE) region. More than 50 insurance companies and pension funds in 30 countries form a Group with a long-standing tradition, strong brands and close customer relations. Around 30,000 employees in

Bajaj Allianz Life Insurance, one of the fastest-growing life insurers, is a joint venture between Bajaj Finserv Limited, one of the most diversified financial institutions in India, and Allianz SE, a leading global financial services provider with a presence in 70+ countries. Our remarkable journe

The Life Insurance Corporation of India (LIC) is a state-owned Life Insurance Company of India. Founded in 1956, it operates as a Government-Owned Corporation, headquartered in Mumbai, Maharashtra, and is a key player in the life insurance sector in India. LIC offers a wide range of insurance produ

Allianz Partners is a world leader in B2B2C insurance and assistance, offering global solutions that span international health and life, travel insurance, automotive and assistance. Customer driven, our innovative experts are redefining insurance services by delivering future-ready, high-tech high-t
.png)
If you were affected by the Sentinel Security Life Insurance Company data breach, you may be entitled to compensation.
If you were impacted by the Energy Capital Credit Union data breach, learn more about how a class action lawsuit could help and what you...
Sentinel Security Life Insurance Co. and Atlantic Coast Life Insurance Co. reported a cyber incident that may have exposed personally...
Data breach at SSL and ACL impacts many, exposing names, SSNs, and medical info. Check if you're affected and secure your data.
On April 15, 2025, Atlantic Coast Life Insurance Co. discovered suspicious activity on its computer network.
Affected by the Tri-Century Eye Care data breach? Learn why attorneys are investigating a class action and how you may be able to recover money.
If you received a notice that your information was compromised or are a customer of the bank, you may be able to start a class action to...
Attorneys are investigating a potential class action over the Sierra Vista Hospital data breach. If your info was affected, learn what you...
If you received a notice that your information was compromised, you may be able to start a class action to collect money for the harm you've...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Atlantic Coast Life Insurance Company is http://www.atlanticcoastlife.com.
According to Rankiteo, Atlantic Coast Life Insurance Company’s AI-generated cybersecurity score is 696, reflecting their Weak security posture.
According to Rankiteo, Atlantic Coast Life Insurance Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Atlantic Coast Life Insurance Company has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Atlantic Coast Life Insurance Company is not certified under SOC 2 Type 1.
According to Rankiteo, Atlantic Coast Life Insurance Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Atlantic Coast Life Insurance Company is not listed as GDPR compliant.
According to Rankiteo, Atlantic Coast Life Insurance Company does not currently maintain PCI DSS compliance.
According to Rankiteo, Atlantic Coast Life Insurance Company is not compliant with HIPAA regulations.
According to Rankiteo,Atlantic Coast Life Insurance Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Atlantic Coast Life Insurance Company operates primarily in the Insurance industry.
Atlantic Coast Life Insurance Company employs approximately 29 people worldwide.
Atlantic Coast Life Insurance Company presently has no subsidiaries across any sectors.
Atlantic Coast Life Insurance Company’s official LinkedIn profile has approximately 437 followers.
Atlantic Coast Life Insurance Company is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.
No, Atlantic Coast Life Insurance Company does not have a profile on Crunchbase.
Yes, Atlantic Coast Life Insurance Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/atlantic-coast-life-insurance-company.
As of January 21, 2026, Rankiteo reports that Atlantic Coast Life Insurance Company has experienced 1 cybersecurity incidents.
Atlantic Coast Life Insurance Company has an estimated 15,155 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with idx (credit monitoring and identity restoration services), and communication strategy with mailed notices to affected individuals..
Title: Atlantic Coast Life Insurance Company Data Breach
Description: Atlantic Coast Life Insurance Company discovered suspicious activity on its computer systems. An investigation revealed that an unauthorized actor accessed certain company systems between April 7, 2025, and April 15, 2025, potentially accessing and/or acquiring files containing sensitive information.
Date Detected: 2025-04-15
Date Resolved: 2025-12-17
Type: Data Breach
Threat Actor: Unauthorized actor
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Sensitive personally identifiable information
Systems Affected: Company computer systems
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Name, Social Security Number, Individual Taxpayer Identification Number, Financial Account Information, Date Of Birth, Medical Or Health Insurance Information and .

Entity Name: Atlantic Coast Life Insurance Company
Entity Type: Insurance Provider
Industry: Insurance
Location: Charleston, South Carolina, USA

Third Party Assistance: IDX (credit monitoring and identity restoration services)
Communication Strategy: Mailed notices to affected individuals
Third-Party Assistance: The company involves third-party assistance in incident response through IDX (credit monitoring and identity restoration services).

Type of Data Compromised: Name, Social security number, Individual taxpayer identification number, Financial account information, Date of birth, Medical or health insurance information
Sensitivity of Data: High
Data Exfiltration: Potentially acquired
Personally Identifiable Information: Yes

Recommendations: Review financial and medical accounts for suspicious activity, Obtain free credit reports from Equifax, Experian, and TransUnion, Place a fraud alert or credit freeze on your credit file, File a police report and report to the state Attorney General and FTC if identity theft is suspected, Enroll in free credit monitoring and identity restoration services through IDXReview financial and medical accounts for suspicious activity, Obtain free credit reports from Equifax, Experian, and TransUnion, Place a fraud alert or credit freeze on your credit file, File a police report and report to the state Attorney General and FTC if identity theft is suspected, Enroll in free credit monitoring and identity restoration services through IDXReview financial and medical accounts for suspicious activity, Obtain free credit reports from Equifax, Experian, and TransUnion, Place a fraud alert or credit freeze on your credit file, File a police report and report to the state Attorney General and FTC if identity theft is suspected, Enroll in free credit monitoring and identity restoration services through IDXReview financial and medical accounts for suspicious activity, Obtain free credit reports from Equifax, Experian, and TransUnion, Place a fraud alert or credit freeze on your credit file, File a police report and report to the state Attorney General and FTC if identity theft is suspected, Enroll in free credit monitoring and identity restoration services through IDXReview financial and medical accounts for suspicious activity, Obtain free credit reports from Equifax, Experian, and TransUnion, Place a fraud alert or credit freeze on your credit file, File a police report and report to the state Attorney General and FTC if identity theft is suspected, Enroll in free credit monitoring and identity restoration services through IDX

Source: Shamis & Gentile P.A.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Shamis & Gentile P.A..

Investigation Status: Completed
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Mailed notices to affected individuals.

Customer Advisories: Mailed notices to affected individuals; assistance line at 844-419-5502 for support and enrollment in protection services
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Mailed notices to affected individuals; assistance line at 844-419-5502 for support and enrollment in protection services.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as IDX (credit monitoring and identity restoration services).
Last Attacking Group: The attacking group in the last incident was an Unauthorized actor.
Most Recent Incident Detected: The most recent incident detected was on 2025-04-15.
Most Recent Incident Resolved: The most recent incident resolved was on 2025-12-17.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive personally identifiable information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was IDX (credit monitoring and identity restoration services).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive personally identifiable information.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Place a fraud alert or credit freeze on your credit file, Enroll in free credit monitoring and identity restoration services through IDX, Obtain free credit reports from Equifax, Experian, and TransUnion, File a police report and report to the state Attorney General and FTC if identity theft is suspected and Review financial and medical accounts for suspicious activity.
Most Recent Source: The most recent source of information about an incident is Shamis & Gentile P.A..
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Customer Advisory: The most recent customer advisory issued was an Mailed notices to affected individuals; assistance line at 844-419-5502 for support and enrollment in protection services.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.