- A data breach is often not discovered internally but through external indicators: darknet monitoring, journalists, affected customers, or security researchers.
- The GDPR requires notification to the data protection supervisory authority within 72 hours, and in cases of high risk, notification of affected individuals without undue delay.
- The forensic root cause analysis must answer two questions: How did the data leak, and exactly which data is affected? Without these answers, neither the notification nor damage control is possible.
- Customer notifications must be honest, understandable, and action-oriented. Affected individuals need to know what happened, which data is affected, and what they can do themselves.
- Damage control encompasses technical immediate measures (blocking access, closing the vulnerability), legal steps (takedown requests, criminal complaint), and communication measures (proactive information rather than waiting).
Wednesday, 08:47 AM: An Email That Changes Everything
Sabine Thalmann is the IT manager at Fröhlich & Partner Steuerberatungsgesellschaft mbH in Nuremberg. 45 employees, approximately 2,800 clients, ranging from small trades to mid-market industrial companies. The firm processes highly sensitive data: tax returns, annual financial statements, payroll records, bank details, social security numbers.
On Wednesday morning at 08:47 AM, Sabine opens an email from an IT security service provider that operates dark web monitoring for the firm:
"Alert: Dataset referencing your organization identified on the darknet. Forum: [forum name]. Publication time: Tuesday evening, 10:15 PM. Scope: approximately 4,200 records with names, addresses, tax IDs, and bank details. Sample records attached for verification."
Sabine opens the attachment and immediately recognizes real client data. Names she knows, addresses that match, tax IDs that check out. This is not a false alarm. The data is real, and it is available for download on the darknet.
The next 72 hours will be the most demanding of her career.
Wednesday, 09:00 AM: The First Hour
Sabine follows the incident response plan that the firm created as part of its ISMS implementation. She tackles three steps in parallel.
Step 1: Verification
Before any escalation takes place, Sabine must confirm that the alert is legitimate. She cross-references the sample records with the client database. The match is clear: these are real client records from their own system.
The next question: How current is the data? Sabine checks the records for timestamps. A client who only switched to the firm three months ago already appears in the data. This means the data was exfiltrated no more than three months prior, not from some older backup theft.
Step 2: Escalation
Sabine informs the three senior partners of the firm in a face-to-face meeting, not via email, because she does not yet know whether the email system has been compromised. She describes the situation matter-of-factly: "We have a confirmed data exfiltration. Client data is on the darknet. I need immediate approval for external forensics and involvement of our data protection officer."
The partners react differently. One wants to call all clients immediately (premature), another wants to wait and see if it is an isolated incident (dangerous). Sabine calmly explains that there are legal deadlines and that the next steps must follow a clear plan.
Step 3: Immediate Containment
Even before the forensic analysis begins, Sabine implements immediate measures to stop further data exfiltration:
- All remote access (VPN, Remote Desktop) is deactivated
- Firewall logs from the last 90 days are secured and copied to a separate storage medium
- All external database connections are blocked
- Passwords for all administrator accounts are reset
- The firm's external internet access is temporarily restricted to a whitelist: only known IP addresses are allowed outbound
These measures are intentionally drastic. They limit the firm's operational capability, but they prevent a potentially still-active attacker from extracting more data.
Wednesday, 10:30 AM: The Forensic Investigation Begins
The external IT forensics specialist arrives. Their primary task is to answer two core questions on which everything else depends:
Question 1: How did the data leak? Without knowing the attack vector, the vulnerability cannot be closed, and there is a risk that the attacker still has access.
Question 2: Exactly which data is affected? Without knowing the precise scope, neither the GDPR notification can be accurately filed nor the customer notification appropriately drafted.
Analyzing the Attack Vector
The forensics specialist begins with the firewall logs and the access logs of the client management system (an industry-specific application running on a local server). The analysis reveals the following picture:
About six weeks earlier, a known vulnerability in the web interface of the client management system was exploited. The vendor had released a security patch, but the firm had not yet applied the update — a classic patch management failure — because there was a compatibility conflict with another software module, and the update had been postponed to "next month."
The attacker exploited the vulnerability to place a web shell on the server — a small file that gave them persistent remote access to the system without triggering the regular authentication mechanisms. Through this web shell, the attacker accessed the client database in multiple sessions and exported the records incrementally, to avoid transferring conspicuous amounts of data at once.
The Scope of the Leak
The forensic analysis shows that the attacker exported a total of 4,247 records over a period of four weeks. The affected data includes:
- Personal identification data: Name, address, date of birth, phone number, email address
- Tax data: Tax ID, tax number, income details
- Bank details: IBAN, BIC, account holder
- Social security data: Social security number (for clients with payroll services)
Not affected: Tax returns and financial statements (stored in a separate, encrypted document management system), client portal credentials (stored hashed and salted), and internal working documents of the firm.
This is a serious data breach, but not the worst case. However, the combination of tax IDs, bank details, and social security numbers enables identity theft, and that is precisely what makes this case so critical.
Wednesday, 02:00 PM: The GDPR Clock Is Ticking
The 72-hour deadline under Art. 33 GDPR for notification to the data protection supervisory authority starts from the moment the firm became aware of the data breach. That was Wednesday at 08:47 AM, so the deadline expires Saturday at 08:47 AM.
Sabine and the external data protection officer sit down together to prepare the notification. The GDPR requires the following information under Art. 33(3):
Mandatory Notification Details
Nature of the breach: Unauthorized access to personal data and data exfiltration over a period of four weeks through exploitation of an unpatched vulnerability in the client management system.
Categories and number of affected individuals: Approximately 4,200 natural persons, including clients (private individuals) and employees of client companies (payroll data).
Categories of affected data: Personal identification data, tax identification data, bank details, social security numbers.
Likely consequences: Risk of identity theft, risk of misuse of bank data for unauthorized direct debits, risk of misuse of tax IDs for fraudulent tax returns.
Measures taken and proposed: Closure of the vulnerability, deactivation of all remote access, forensic analysis, password reset for all administrator accounts, planned notification of affected individuals.
Contact details of the data protection officer: Name, email, phone.
Filing the Notification
The notification is filed through the online portal of the responsible state data protection authority (in Bavaria: BayLDA). Sabine ensures that all known information is entered and clearly marks which information is still pending. Under Art. 33(4) GDPR, the notification may also be provided in phases if not all information is available simultaneously. A timely, incomplete notification is better than a late, complete one.
Thursday, 09:00 AM: Customer Notification
Art. 34 GDPR obliges the data controller to notify affected individuals without undue delay when the data breach is likely to result in a high risk to their rights and freedoms. With tax IDs, bank details, and social security numbers, this high risk is beyond question.
The Notification Letter
Sabine and the data protection officer draft a letter that pursues three goals: inform, reassure, and empower. The letter is sent by postal mail (not by email, since the email addresses themselves are part of the leak and the recipient could receive phishing emails referencing the incident).
The letter contains:
What happened? A clear, understandable description of the incident without technical jargon. "Unknown third parties gained unauthorized access to our IT system and stole personal data of our clients. The data was published in an illegal internet forum."
Which data is affected? A specific list, not vague language like "possibly some of your data." Each client must know which of their data is affected.
What is the risk? Honest but without causing panic. "With the stolen data, third parties could attempt to conduct bank transactions in your name, enter into contracts, or file tax returns."
What are we doing? List of measures taken: vulnerability closed, authorities informed, criminal complaint filed, forensic analysis underway, darknet monitoring for tracking.
What can you do? Specific recommended actions:
- Check bank accounts for unauthorized debits and report to the bank if needed
- Check credit rating with SCHUFA and request a self-disclosure report if necessary
- Use an identity protection service (the firm is offering affected clients a free service for 12 months)
- Inform the tax office and have the tax ID checked for misuse
- Watch for phishing attempts that may reference this incident
Contact information: A dedicated hotline number and email address for inquiries.
The Reactions
The notifications are sent on Thursday and Friday. The reactions are mixed. Some clients respond with understanding, others are angry, and some immediately terminate the client relationship. Three clients announce legal action. A journalist from the local newspaper calls after a client shared the letter on social media.
The firm's partners have prepared for these situations and use the prepared communication guidelines: inform honestly about the incident, emphasize the measures taken, no speculation about causes or blame, and reference the ongoing cooperation with authorities.
Friday to Sunday: Damage Control
In parallel with client communication, the technical damage control measures proceed.
Takedown Request
On behalf of the firm, the IT forensics specialist files a takedown request with the hosting provider of the darknet forum. The chances of success are low, as darknet forums are deliberately operated on infrastructure that evades government control. Nevertheless, the request is documented — it demonstrates to authorities and insurance that the firm is actively working against the spread of the data.
Criminal Complaint
The criminal complaint is filed with the Central Cybercrime Unit of the General Prosecutor's Office in Bamberg (responsible for Bavaria). The complaint includes all forensic findings, the darknet URL, the sample records, and the results of the log analysis. The chances of a successful investigation are difficult to assess, but the documentation is essential.
Closing the Vulnerability and Hardening the System
The triggering issue is resolved: the security patch is applied, the web shell is removed, and the server is checked for additional backdoors. Beyond that, the following measures are implemented:
- The client management system is placed behind a Web Application Firewall (WAF)
- All database accesses are logged and monitored with anomaly detection
- The server is rebuilt from scratch (clean install), since it cannot be certain that the attacker did not place additional backdoors
- Network segmentation is tightened: the database server is no longer directly accessible from the internet
- Automated patch management is introduced to apply security-critical updates within 48 hours
Intensifying Darknet Monitoring
The monitoring service provider is tasked with actively tracking the spread of the stolen data. If the data appears on additional platforms, an immediate notification is to follow. Additionally, monitoring is set up for the names and tax IDs of the most severely affected clients, to detect early if the data is being used for identity theft.
Weeks 2 to 4: Post-Incident Review and Consequences
Supplementary GDPR Notification
Once the forensic analysis is complete, Sabine files a supplementary notification with the data protection supervisory authority. This contains the complete findings: the exact attack vector, the full scope of affected data, the timeframe of unauthorized access, and the complete list of remediation measures taken.
Possible Consequences from the Supervisory Authority
The data protection supervisory authority reviews the incident and may take various measures:
- Warning: In case of a first-time violation and cooperative behavior (most likely scenario)
- Order of specific measures: The authority can order technical or organizational measures
- Fine: In cases of negligence (here: unpatched, known vulnerability), a fine may be imposed. The amount depends on the nature, severity, and duration of the violation, the number of affected individuals, and the degree of responsibility. For a company of this size, fines typically range in the five-figure area
Civil Liability Claims
Affected clients can assert compensation claims under Art. 82 GDPR. Non-material damages (loss of control over personal data, fear of identity misuse) are increasingly recognized by courts, with amounts typically awarded between 500 and 5,000 euros per person. With 4,200 affected individuals, this represents a significant liability risk, even if only a fraction actually sue.
Lessons Learned
Two weeks after the incident, Sabine conducts a lessons-learned workshop. The key findings:
What worked:
- The dark web monitoring made the incident visible in the first place
- The incident response plan structured the first hours
- The rapid involvement of external forensics quickly identified the attack vector
- The proactive client communication preserved trust with most clients
What did not work:
- Patch management was inadequate. The known vulnerability should have been patched within days, not months
- There was no monitoring for unusual database exports. The incremental exfiltration of 4,200 records over four weeks should have been detected
- The web shell was not detected because no file integrity monitoring was running on the server
- There were no pre-prepared communication templates for client notifications
Action plan:
| Measure | Priority | Deadline |
|---|---|---|
| Automated patch management for all servers | Critical | Immediately |
| Implement file integrity monitoring | High | 4 weeks |
| Database access monitoring with anomaly detection | High | 6 weeks |
| Web Application Firewall for all web applications | High | 4 weeks |
| Create communication templates for data protection incidents | Medium | 6 weeks |
| Regular penetration tests (bi-annually) | Medium | 8 weeks |
| Obtain cyber insurance | High | 4 weeks |
How Is a Data Breach Actually Discovered?
The Fröhlich & Partner case illustrates one of the most common discovery methods: external monitoring. But there are several ways a data breach comes to light, and each has its own implications:
Darknet monitoring: Specialized service providers continuously scan darknet forums, paste sites, and leak databases for data that can be attributed to a company. Detection is timely but only occurs after publication.
Reports from affected individuals: A customer reports suspicious activity on their bank account or receives phishing emails containing information that only the affected company could have had. These reports often come weeks or months after the actual data exfiltration.
Reports from security researchers: Ethical hackers or security researchers discover the dataset and inform the affected company — sometimes directly, sometimes through platforms like the Responsible Disclosure guidelines of CERT-Bund.
Journalists: Investigative journalists research data breaches and contact the company for a statement. This is the least favorable discovery scenario because it leaves the least time buffer for your own response.
Internal monitoring: In rare cases, the company's own security monitoring detects unusual data outflows. However, this requires that appropriate monitoring systems exist and are actively supervised, which is not the case at many small and mid-market companies.
What This Case Teaches
Data breaches differ from other security incidents in one fundamental way: the data is out and cannot be retrieved. With ransomware, you can restore. With a DDoS attack, you can wait until it is over. But published data remains published — it gets copied, redistributed, and traded.
That is why the focus in a data breach shifts from recovery to damage control and protection of affected individuals. And that requires a different kind of response: less technical, more communicative and legal.
The most important lessons from this scenario:
Patch management is non-negotiable. The known, unpatched vulnerability was the sole reason for this incident. A functioning patch management process with defined timelines for security-critical updates would have prevented the entire incident.
Monitoring is your early warning system. Both the darknet monitoring (which discovered the incident) and the missing database monitoring (which could have made the incident visible earlier) show how critical active surveillance is.
The 72-hour deadline is tighter than you think. Between discovery, verification, forensic analysis, notification, and customer communication, the hours pass quickly. Anyone who is not prepared will miss the deadline or file an incomplete and chaotic report.
Proactive communication protects trust. A prepared strategy for incident communication is essential. The firm lost clients, but significantly fewer than if the incident had become known through the press or through affected clients themselves. In ISMS Lite, data protection incidents can be documented in a structured way, GDPR reporting deadlines can be monitored, and remediation measures can be tracked. Whoever communicates first retains control of the narrative.
Identity theft is the actual damage. For affected clients, the data itself is not the problem, but what third parties can do with it. Free identity protection services for affected individuals are therefore not generosity but a duty and an important signal of accountability.
Further Reading
- DSGVO-Datenpanne melden: Fristen, Inhalt und Ablauf
- Sicherheitsvorfälle kommunizieren: Intern, extern und an die Presse
- Patch-Management im Mittelstand: Prozess aufbauen und Schwachstellen schließen
- Schwachstellenmanagement aufbauen: Vom Scan bis zur Behebung
- Löschkonzept nach DSGVO: Fristen, Prozesse und Umsetzung
