An additional cybersecurity breach has occurred at Taiwanese personal computer manufacturer Acer.
Before this 12 months, the enterprise suffered a $50m ransomware extortion attempt after falling prey to the REvil ransomware group in Might.
In this most recent incident, the computer system maker initiated its security protocols soon after detecting an attack on the area of its after-profits services technique that is primarily based in India.
Prior to Acer’s confirmation of the breach, hackers claimed to have stolen much more than 60 GB of the firm’s data. On the underground cybercrime discussion board RAID, menace actors calling themselves Desorden posted a sample of the allegedly stolen information that appeared to clearly show facts belonging to 10,000 Acer shoppers.
Desorden also posted a movie exhibiting far more data files and databases that the team claims to have exfiltrated from Acer.
The menace actors wrote that the stolen data consists of “consumer, corporate accounts and monetary facts,” and that “affected shopper details are in the thousands and thousands.”
Desorden statements to have stolen the login specifics of at minimum 3,000 Acer shops or distributors.
“We have not too long ago detected an isolated attack on our area right after-sales support process in India,” mentioned Steven Chung, Acer Company Communications, in a statement to the media.
“Upon detection, we promptly initiated our security protocols and done a full scan of our devices. We are notifying all possibly affected consumers in India.”
Acer included that the incident experienced been claimed to community regulation enforcement and the Indian Laptop Crisis Response Team.
The enterprise reported that the incident “has no material affect to our operations and small business continuity.”
The breach isn’t the initial to hit Acer’s India functions. In 2012, Maxney from the Turkish hacker group regarded as Ajan breached six Acer India sub-domains, defacing landing web pages and thieving 15,000 consumer credentials.
“Ransomware attacks are evolving, targeting following-gen apps like Kubernetes and Microsoft 365,” mentioned Andy Fernandez, senior manager, item internet marketing, Zerto. “As the adoption of cloud purposes grows, so will exploits and assaults and in transform the great importance of restoring facts.”
He added: “Modern day businesses that are accountable for that information will have to have to have indigenous info security alternatives that can support them safeguard inner purposes and applications shipped utilizing containers.”
Some parts of this article are sourced from:
www.infosecurity-journal.com