• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Acer Confirms Unauthorized Access But Says No Consumer Data Stolen

You are here: Home / General Cyber Security News / Acer Confirms Unauthorized Access But Says No Consumer Data Stolen
March 9, 2023

Taiwanese electronics maker Acer has confirmed an accident of unauthorized obtain to 1 of its document servers for repairs technicians.

In a assertion shared with Infosecurity by way of email, the multinational corporation additional that it thinks no customer data was accessed thanks to the breach.

“While our investigation is ongoing, there is at the moment no indicator that any customer facts was stored on that server.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


A threat actor self-recognized as “Kernelware” claimed responsibility for the hack on a dark web forum before this week. They stated they executed the attack mid-February and stole 160GB of information and facts from the business, like 655 directories and 2869 data files.

In the very same discussion board post, Kernelware made available to provide the allegedly stolen information for XMR (Monero) and delivered a sample showcasing slides and shows, technical manuals, backend infrastructure data, product product documentation and information and facts about various devices, between other factors.

Acer has neither verified the leak nor whether the information posted by Kernelware is authentic.

In accordance to Tim Schultz, VP of analysis & engineering at Scythe, the breach may possibly replicate the shifting nature of previously ransomware-targeted danger actors.

“As providers shift absent from spending ransoms, risk actors are adapting by expanding their emphasis on IP information theft to increase the likely organization impact of every single compromise. In the around phrase, we’ll see the very same playbook very similar threat actors have taken on stealing IP and attempting to monetize it,” Schultz mentioned.

And in accordance to Amit Sharma, a security engineer at Synopsys, when information are now scarce, it is nevertheless important for the organization to perform thanks diligence to incorporate the attack and make certain details safety.

“Organizations must have multi-layered controls to detect or block these forms of attacks, but, as the complexity of attacks increases, we need to have to make it more streamlined and much more concrete,” Sharma additional.

“These sorts of attacks also give us a reasonable indicator on why it is extremely critical to have asset administration in area and take a choice on what requires to be monitored, what is exposed and what should be prioritized.”

The Acer breach will come times just after DoControl posted a report suggesting community software as a service (SaaS) property are a major risk for medium and substantial firms.

Editorial image credit rating: Anton Watman / Shutterstock.com


Some elements of this write-up are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News TikTok Initiates Project Clover Amid European Data Security Concerns
Next Post: 8220 Gang Behind ScrubCrypt Attack Targeting Oracle Weblogic Server Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.