Seiko Attacked By BlackCat

The ransomware gang BlackCat has  claimed responsibility for a ransomware attack on Japanese  Seiko Group Corp on August 10th and has now published samples of stolen data files as proof of its attack. 

Seiko is a diverse electronics business, best known as one of the world's largest and most watchmakers. Seiko has 12,000 employees and an annual revenue of $1.6 billion.

The cyber criminals claim to have stolen 2 Tb worth of files, including employee information, production technology details, video and audio recordings of management meetings, emails, and copies of passports belonging to employees and foreign visitors.  

Now, the ransomware group has published screenshots to demonstrate that they have obtained contracts and other corporate documents, confidential technical documents, passport copies, and emails.

Seiko  has confirmed that on July 28th of this year, the Company suffered a possible data breach. It appears that some as-yet-unidentified party or parties gained unauthorised access to at least one of our servers. “Subsequently, on August 2nd, we commissioned a team of external cybersecurity experts to investigate and assess the situation... As a result, we are now reasonably certain that there was a breach and that some information stored by our Company and/or our Group companies may have been compromised." says Seiko.

Seiko and their working to verify the exact nature of the information that was stored on the impacted servers “Working closely with cyber security experts, we are now making every effort to prevent further damage and to ensure that our systems are secure against any similar recurrence." Seiko's customers and business partners are invited to make immediate contact if they receive any suspicious or unusual emails or notifications.

BlackCat has since claimed to be behind the attack on Seiko, posting samples of data that they claim to have stolen during the attack. BlackCat  criticised  Seiko's IT security and leaked what appear to be production plans, employee passport scans, new model release plans, and specialised lab test results. The hackers also leaked samples of what they claim are confidential technical schematics and Seiko watch designs as part of their extortion attempt.

Seiko is the latest victim of a sequence of large scale, damaging attacks on Japanese business and infrastructure this year, including a potential supply chain attack on customers of Fujitsu and the Port of Nagoya.  

SII:    Bleeping Computer:     Security Week:   Bank Info Security:  TEISS:   Silicon Angle:   

Image: Sergey Samin

You Might Also Read: 

ABB Struck By Black Basta Ransomware:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Hospital IoT & IoMT Cyber Security Risk
Empower Your DaaS Programs »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

PrivateVPN

PrivateVPN

PrivateVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

1Touch.io

1Touch.io

1touch.io Inventa is an AI-based, sustainable data discovery and classification platform that provides automated, near real-time discovery, mapping, and cataloging of all sensitive data.

Google Cloud

Google Cloud

Accelerate your digital transformation. Whether your business is early in its journey or well on its way to digital transformation, Google Cloud can help solve your toughest challenges.

Dedge Security

Dedge Security

Dedge Security is on a mission to help organizations to create secure Web3 applications and accelerate their businesses with confidence.