• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Hive Ransomware Group Leaks Data Stolen in Tata Power Cyber-Attack

You are here: Home / General Cyber Security News / Hive Ransomware Group Leaks Data Stolen in Tata Power Cyber-Attack
October 26, 2022

The Hive ransomware-as-a-support (RaaS) group has claimed duty for the cyber-attack from Tata Electric power disclosed by the enterprise on Oct 14 and believed to have transpired on October 3.

“The business has taken measures to retrieve and restore the methods. All critical operational units are working,” the Mumbai-primarily based company said at the time.

According to security researcher Rakesh Krishnan, the leak has reportedly afflicted various of Tata’s 12 million buyers and features personally identifiable info (PII) like Aadhaar countrywide identity card figures, tax account numbers, wage information, addresses and phone quantities, among other folks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Quite a few have taken Hive leaking the stolen details to signify that any ransomware negotiations unsuccessful, but Edward Liebig, world wide director of cyber-ecosystem at Hexagon, has suggested a unique selection.

“Let’s face it, even if negotiations are effective, there is nevertheless only a 50% probability of restoration of the encrypted belongings,” Liebig instructed Infosecurity in an emailed statement.

“The choice to pay out or not to fork out is a business connect with. If the business is in a incredibly susceptible place (recovery of property is not doable), if there is a probability for incredibly detrimental information to be compromised, or if the opportunity enterprise impression significantly outweighs the ransom payment, then the business enterprise could make a decision to pay back.”

According to the govt, one more part to think about in this scenario is the principles of the cyber insurance policies carrier. 

“Some Cyber Insurers prohibit the payment of a ransom,” Liebig stated. “This usually means that a ransomware Incident Reaction (IR) playbook should have a extremely defined and comprehensive declaration and acceptance process that goes to the top rated of the government workforce.”

A lot more commonly, Liebig has explained he thinks that increasing the likelihood of defending against ransomware starts with seeing the front and back doors.

“Watch for, block, and teach against incoming spam and phishing tries. Know your assets and endpoints. Know and mitigate the vulnerabilities inside of your natural environment that help the exploitation of these assets,” Liebig described.

“The best way to protect in opposition to ransomware is never ever to enable it just take root in your techniques. The next greatest way is to have a bulletproof, trustworthy recovery approach to minimize downtime and do away with the ‘ransom’ debate.”

According to stats posted by Intel 471 and Digital Shadows, Hive was the 3rd-most common ransomware relatives observed in Q3 2022. 

The ransomware group also upgraded its applications to Rust in July to produce more advanced encryption.


Some parts of this posting are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News London’s New Cyber Resilience Centre Set to Fight Cybercrime in the Capital
Next Post: Kimsuky Hackers Spotted Using 3 New Android Malware to Target South Koreans kimsuky hackers spotted using 3 new android malware to target»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Copyright © TheCyberSecurity.News, All Rights Reserved.