therecord.media
Open in
urlscan Pro
2606:4700::6812:1c78
Public Scan
URL:
https://therecord.media/yamaha-confirms-cyberattack-after-multiple-ransomware-gangs-claim
Submission: On July 25 via api from TR — Scanned from DE
Submission: On July 25 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * People * Technology * Mobile App * About * Podcast * Contact Go SUBSCRIBE TO THE RECORD Subscribe Image: Keller Chewning Jonathan GreigJuly 24th, 2023 * News * Cybercrime * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. YAMAHA CONFIRMS CYBERATTACK AFTER MULTIPLE RANSOMWARE GANGS CLAIM ATTACKS Yamaha’s Canadian music division confirmed that it recently dealt with a cyberattack after two different ransomware groups claimed to have attacked the company. The Yamaha Corporation — different from the spun-off motorcycle division — is a Japanese manufacturing giant producing musical instruments and audio equipment. It is considered the world’s largest producer of musical equipment. In a statement last Thursday, Yamaha Canada Music said it “recently encountered a cyberattack that led to unauthorized access and data theft.” “In response, we swiftly implemented measures to contain the attack and collaborated with external specialists and our IT team to prevent significant damage or malware infiltration into our network,” the company said. “Yamaha Canada has been notifying affected individuals, and we are offering credit monitoring services to those at risk of potential harm. Additionally, we have taken decisive actions to reinforce our network defenses and ensure enhanced security measures moving forward.” The company added that its primary focus right now is to “mitigate any adverse consequences stemming from this criminal act.” Representatives did not respond to requests for comment about whether the incident involved ransomware but the company is the latest example of a growing cybersecurity trend drawing alarm among experts. On June 14, the company was posted on the Black Byte ransomware gang’s list of victims, according to cybersecurity expert Dominic Alvieri. But on Friday, Yamaha appeared on the leak site of the Akira ransomware group. Alvieri said it is becoming increasingly common for victim organizations to be posted by two different ransomware groups. He noted that at least one organization this year was posted by three different groups. “It is a major trend this year,” he said. “There is way more double posting going on.” There have been several high-profile double postings this year, including the city of Oakland, which appeared on the leak sites of the Play and LockBit ransomware gangs. Seasoned ransomware experts did not have a clear answer on why victims are showing up on multiple leak sites, floating several theories that may be driving the trend. Recorded Future ransomware researcher Allan Liska said double postings do appear to be happening more often. “I think it is affiliates working for two different groups, trying to bring more attention to their victims. It is a win for the affiliate and the ransomware as a service group because it brings more attention to the victim, better for coercing ransom payments and it gives the ransomware-as-a-service group more ‘clout,’” he said. “It would be interesting to see how the payment structure on these listings work. Like do all three parties split the ransom or only the RaaS group that the victim pays through plus the affiliate?” Other experts wondered whether cybercrime gangs are simply operating multiple ransomware “brands” and moving between each. “A third option is operations collaborating and sharing data on multiple sites to maximize their reach,” said Emsisoft threat analyst Brett Callow. “Without more information, it’s impossible to say what’s happening.” BlackByte initially emerged in September 2021 with a poorly-coded ransomware, according to experts. The cybersecurity firm Trustwave found a weakness in it and used it to create a free decrypter. But the group created a second version of the ransomware, which solved the bugs found by Trustwave, and have been able to launch several attacks since. The FBI released a security alert about BlackByte just one day before it drew global headlines for an attack on the San Francisco 49ers on the same day as the Super Bowl. The Akira ransomware group, meanwhile, was first identified in March 2023 before taking credit for several high-profile incidents — including attacks on the government of Nassau Bay in Texas, Bluefield University, a state-owned bank in South Africa and major forex broker London Capital Group. Researchers noted that the Akira ransomware bears several similarities to the Conti ransomware, which they said “may indicate that the malware authors were at least inspired by the leaked Conti sources.” * * * * * Tags * Akira * BlackByte * Ransomware JONATHAN GREIG Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic. Previous articleNext article Two new vulnerabilities found in popular baseboard software Pro-China influence campaign allegedly financed staged protests in Washington * Ivanti urges customers to apply patch for exploited MobileIron vulnerabilityJuly 24th, 2023 * VirusTotal apologizes for accidental leak that exposed customer dataJuly 21st, 2023 * FTC, HHS warn health providers not to use tracking tech in websites, appsJuly 20th, 2023 * Apple accuses UK government of trying to become ‘global arbiter’ of encryptionJuly 20th, 2023 * Cyber assistance bills for agriculture sector gain bipartisan attention in SenateJuly 20th, 2023 * Russia’s Turla hackers target Ukraine’s defense with spywareJuly 19th, 2023 * BlackCat, Clop claim ransomware attack on cosmetics maker Estée LauderJuly 19th, 2023 * Cloudflare reports surge in sophisticated DDoS attacksJuly 19th, 2023 * Russian medical lab suspends some services after ransomware attackJuly 18th, 2023 PUTIN’S POTENTIAL SUCCESSORS PART 2: ALEKSEY DYUMIN Putin’s Potential Successors Part 2: Aleksey Dyumin CHINA'S TARGETING OF INTERNATIONAL COMPANIES IN GEOPOLITICAL COMPETITION China's Targeting of International Companies in Geopolitical Competition THE ESCALATING GLOBAL RISK ENVIRONMENT FOR SUBMARINE CABLES The Escalating Global Risk Environment for Submarine Cables NORTH KOREA’S CYBER STRATEGY North Korea’s Cyber Strategy BLUEDELTA EXPLOITS UKRAINIAN GOVERNMENT ROUNDCUBE MAIL SERVERS TO SUPPORT ESPIONAGE ACTIVITIES BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities * * * * * Privacy Policy © Copyright 2023 | The Record from Recorded Future News