The Hive ransomware-as-a-support (RaaS) group has claimed duty for the cyber-attack from Tata Electric power disclosed by the enterprise on Oct 14 and believed to have transpired on October 3.
“The business has taken measures to retrieve and restore the methods. All critical operational units are working,” the Mumbai-primarily based company said at the time.
According to security researcher Rakesh Krishnan, the leak has reportedly afflicted various of Tata’s 12 million buyers and features personally identifiable info (PII) like Aadhaar countrywide identity card figures, tax account numbers, wage information, addresses and phone quantities, among other folks.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Quite a few have taken Hive leaking the stolen details to signify that any ransomware negotiations unsuccessful, but Edward Liebig, world wide director of cyber-ecosystem at Hexagon, has suggested a unique selection.
“Let’s face it, even if negotiations are effective, there is nevertheless only a 50% probability of restoration of the encrypted belongings,” Liebig instructed Infosecurity in an emailed statement.
“The choice to pay out or not to fork out is a business connect with. If the business is in a incredibly susceptible place (recovery of property is not doable), if there is a probability for incredibly detrimental information to be compromised, or if the opportunity enterprise impression significantly outweighs the ransom payment, then the business enterprise could make a decision to pay back.”
According to the govt, one more part to think about in this scenario is the principles of the cyber insurance policies carrier.
“Some Cyber Insurers prohibit the payment of a ransom,” Liebig stated. “This usually means that a ransomware Incident Reaction (IR) playbook should have a extremely defined and comprehensive declaration and acceptance process that goes to the top rated of the government workforce.”
A lot more commonly, Liebig has explained he thinks that increasing the likelihood of defending against ransomware starts with seeing the front and back doors.
“Watch for, block, and teach against incoming spam and phishing tries. Know your assets and endpoints. Know and mitigate the vulnerabilities inside of your natural environment that help the exploitation of these assets,” Liebig described.
“The best way to protect in opposition to ransomware is never ever to enable it just take root in your techniques. The next greatest way is to have a bulletproof, trustworthy recovery approach to minimize downtime and do away with the ‘ransom’ debate.”
According to stats posted by Intel 471 and Digital Shadows, Hive was the 3rd-most common ransomware relatives observed in Q3 2022.
The ransomware group also upgraded its applications to Rust in July to produce more advanced encryption.
Some parts of this posting are sourced from:
www.infosecurity-magazine.com