• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
bose admits ransomware attack exposed employee data

Bose admits ransomware attack exposed employee data

You are here: Home / General Cyber Security News / Bose admits ransomware attack exposed employee data
May 25, 2021

Shutterstock

Bose has confirmed that it had knowledgeable a info breach, acquiring fallen sufferer to a ransomware attack in early March.

The audio devices maker admitted to the incident in a letter sent to the office of the Lawyer Normal at the New Hampshire Client Safety Bureau last 7 days. In the filing, the firm’s lawful consultant said that Bose had “knowledgeable a advanced cyber-incident that resulted in the deployment of malware/ransomware across [its] ecosystem”. The incident is only identified to have impacted Bose’s US techniques.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Promptly on exploring the attack on March 7, Bose initiated incident reaction protocols, activated its complex crew to have the incident, and hardened its defenses from unauthorized action,” the letter continued.

In late April, the firm’s investigation discovered that hackers managed to acquire HR facts “relating to six former New Hampshire workers”, which includes “title, Social Security Selection, and compensation-linked facts”.

Though Bose’s investigators could not discover “proof to validate that the facts contained in these data files was productively exfiltrated”, the corporation was also “unable to confirm that it was not”.

In accordance to Bose’s consultant, the company has taken techniques to even further look into the information breach by cooperating with the FBI as perfectly as using “professionals to keep an eye on the dark web for any indications of leaked facts”.

The business has also sought to mitigate the possibilities of a foreseeable future cyber attack taking place by maximizing its server and endpoint security, performing “in-depth forensics analysis on the impacted server to analyse the impact of the malware/ransomware”, and “enhanced monitoring and logging to recognize any foreseeable future actions by the threat actor or comparable forms of attacks”.

It also confirmed that the destructive files utilized in the course of the attack, as very well as “recently recognized malicious web sites and IPs joined to this danger actor”, had been blocked.

Bose Media Relations Director Joanne Berthiaume explained to Bleeping Laptop or computer that the business had not built “any ransom payment”.

The identification of the hackers is not recognised, but the incident follows in the footsteps of several other the latest large-profile ransomware attacks that targeted Colonial Pipeline, as very well as the Irish and New Zealand overall health solutions.


Some sections of this post are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News GCHQ's mass surveillance regime ruled unlawful
Next Post: Home Office reveals plans for long-overdue ‘digital border’ home office reveals plans for long overdue 'digital border'»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.