therecord.media Open in urlscan Pro
2606:4700:4400::ac40:9b4b  Public Scan

URL: https://therecord.media/seiko-ransomware-attack-leaked-60000-pieces-of-data
Submission: On October 26 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>

Text Content

This website stores cookies on your computer. These cookies are used to improve
your website experience and provide more personalized services to you, both on
this website and through other media. To find out more about the cookies we use,
see our Privacy Policy.

Accept


 * Leadership
 * Cybercrime
 * Nation-state
 * People
 * Technology

 * Mobile App
 * About
 * Podcast
 * Contact

Go
Subscribe to The Record
Subscribe

Image: Jorge Martorell via Wikimedia Commons (CC-BY-SA-3.0)
Joe WarminskyOctober 25th, 2023
 * Briefs
 * Cybercrime

 * 
 * 
 * 
 * 
 * 

Get more insights with the
Recorded Future
Intelligence Cloud.
Learn more.


SEIKO SAYS RANSOMWARE ATTACK LED TO LEAK OF 60,000 ‘ITEMS’ OF PERSONAL DATA

Japanese watchmaker Seiko announced on Wednesday that a ransomware incident
initially reported this summer resulted in the breach of about 60,000 pieces of
personal data from customers, employees, business partners and job applicants.

The company said it had completed a comprehensive review of the breach with
outside cybersecurity experts. The leaked data had been stored by the business
units known as Seiko Group Corporation (SGC), Seiko Watch Corporation (SWC) and
Seiko Instruments Inc. (SII).

“We have begun reaching out to each of the affected parties individually, and if
any further leaks are discovered, we will, to the best of our ability, continue
to respond to each affected party on an individual basis,” Seiko said.

In August the Black Cat cybercrime group, also known as AlphV, took credit for
the incident and soon afterward Seiko confirmed that it was a ransomware attack.

Seiko did not specify what it meant by “items” of personal data, but said
information falls into these categories:

 * Customer information from SWC, “including names, addresses, telephone
   numbers, and/or email addresses.” But “credit card information was not
   compromised.”
 * Contact information for “counterparties involved in business transactions
   with SGC, SWC, and/or SII.” That data included “name, company affiliation,
   job title, company address, company phone number, and/or company email
   address.”
 * Job applicant information from people seeking “employment with SGC and/or
   SWC, including names, addresses, phone numbers, email addresses, and/or
   educational background information.” Information about current and former
   employees of SGC, including “names and/or email addresses.”

Seiko said it is continuing to review the ransomware attack while shoring up its
policies and systems “to prevent any recurrence of this type of incident.”

Another Japanese company with a large watchmaking business, Casio, said last
week that one of its software subsidiaries had a data breach earlier in October.

 * 
 * 
 * 
 * 
 * 

Tags
 * Japan
 * BlackCat
 * Alphv
 * Data breach
 * Seiko

Previous articleNext article
Russian artists’ Spotify accounts defaced by pro-Ukraine hackers
Kazakhstan-based hackers targeting gov’t websites in Central Asia, Cisco says


JOE WARMINSKY



Joe Warminsky is the news editor for Recorded Future News. He has more than 25
years experience as an editor and writer in the Washington, D.C., area. Most
recently he helped lead CyberScoop for more than five years. Prior to that, he
was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent
more than a decade editing coverage of Congress for CQ Roll Call.


BRIEFS

 * Seiko says ransomware attack led to leak of 60,000 ‘items’ of personal
   dataOctober 25th, 2023
 * Philadelphia: Hackers spent three months accessing city gov’t email
   accountsOctober 25th, 2023
 * Neuberger: New global initiatives will include information sharing,
   ransomware payment trackingOctober 24th, 2023
 * Ukraine cyber officials warn of a ‘surge’ in Smokeloader attacks on
   financial, government entitiesOctober 24th, 2023
 * Norway issues warning after ‘important businesses’ affected by Cisco
   zero-daysOctober 24th, 2023
 * War crimes tribunal says September cyberattack was act of espionageOctober
   20th, 2023
 * Business-oriented threat involving ‘several types of malware all at once’
   remains activeOctober 19th, 2023
 * Moldovan accused of running cybercrime marketplace to face charges in US
   October 19th, 2023
 * Eastern European energy and defense firms targeted with MATA backdoorOctober
   18th, 2023


HAMAS APPLICATION INFRASTRUCTURE REVEALS POSSIBLE OVERLAP WITH TAG-63 AND
IRANIAN THREAT ACTIVITY


Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and
Iranian Threat Activity


RUSSIA CREATES NO-WIN SITUATION FOR WESTERN COMPANIES


Russia Creates No-Win Situation for Western Companies


NEAR-SPACE IN CHINA’S MILITARY STRATEGY: STRATEGIC RECONNAISSANCE, PRECISION
STRIKE, AND BATTLEFIELD ADVANTAGE


Near-Space in China’s Military Strategy: Strategic Reconnaissance, Precision
Strike, and Battlefield Advantage


MULTI-YEAR CHINESE APT CAMPAIGN TARGETS SOUTH KOREAN ACADEMIC, GOVERNMENT, AND
POLITICAL ENTITIES


Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and
Political Entities


EMPIRE DRAGON ACCELERATES COVERT INFORMATION OPERATIONS, CONVERGES WITH RUSSIAN
NARRATIVES


Empire Dragon Accelerates Covert Information Operations, Converges with Russian
Narratives
 * 
 * 
 * 
 * 

 * Privacy Policy

© Copyright 2023 | The Record from Recorded Future News