• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Bose Reveals Ransomware Attack Impacting Staff

You are here: Home / General Cyber Security News / Bose Reveals Ransomware Attack Impacting Staff
May 26, 2021

Bose has informed regulators that a advanced ransomware attack again in March led to unauthorized access of personalized information on current and former workforce.

The US audio tech big instructed the New Hampshire Office of the Attorney Typical that it initial detected the ransomware again on March 7 2021. Even so, nearly two months afterwards, on April 29, it identified that human resources information have been accessed.

“The particular information contained in these information consist of title, Social Security Amount, and compensation-relevant details,” it continued.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The forensics evidence at our disposal demonstrates that the threat actor interacted with a restricted set of folders inside these files. However, we do not have proof to validate that the details contained in these files was successfully exfiltrated, but we are also unable to affirm that it was not.”

The agency reported it had engaged 3rd-party gurus to scour the dark web for this information, to check if it is being actively applied by cyber-criminals, and is also performing with the FBI.

“Bose has not been given any indication by way of Could 19, 2021 its checking things to do or from impacted workforce that the info talked over herein has been unlawfully disseminated, sold, or or else disclosed,” it added.

Only a modest selection of employees were being affected and the agency is not assumed to have paid the ransom.

However, it disclosed to the regulator a lengthy list of remedial actions taken by its security staff to mitigate the risk of a even worse attack in the foreseeable future.

This involved: improved anti-malware, logging and monitoring blocking of destructive IPs joined to the risk actor changing passwords for all end customers and altering accessibility keys for all support accounts.

Robert Golloday, EMEA and APAC director at Illusive, praised Bose for its transparency.

“Kudos for not having to pay a ransom and for getting the suitable backups in position. With that said, the time to set in controls for early detection and avoidance of lateral motion is right before these attacks occur, not immediately after,” he included.

“It’s one more regrettable example of an ever-widening felony company.”


Some components of this article are sourced from:
www.infosecurity-magazine.com

Previous Post: «new zealand health service hackers send stolen data to press New Zealand health service hackers send stolen data to press
Next Post: UK Police Suffered Thousands of Data Breaches in 2020 Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.