therecord.media
Open in
urlscan Pro
2606:4700:4400::ac40:9b4b
Public Scan
URL:
https://therecord.media/seiko-ransomware-attack-leaked-60000-pieces-of-data
Submission: On October 26 via api from TR — Scanned from DE
Submission: On October 26 via api from TR — Scanned from DE
Form analysis
1 forms found in the DOM<form><span class="text-black text-sm icon-search"></span><input type="text" name="s" placeholder="Search…" value=""><button type="submit">Go</button></form>
Text Content
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. Accept * Leadership * Cybercrime * Nation-state * People * Technology * Mobile App * About * Podcast * Contact Go Subscribe to The Record Subscribe Image: Jorge Martorell via Wikimedia Commons (CC-BY-SA-3.0) Joe WarminskyOctober 25th, 2023 * Briefs * Cybercrime * * * * * Get more insights with the Recorded Future Intelligence Cloud. Learn more. SEIKO SAYS RANSOMWARE ATTACK LED TO LEAK OF 60,000 ‘ITEMS’ OF PERSONAL DATA Japanese watchmaker Seiko announced on Wednesday that a ransomware incident initially reported this summer resulted in the breach of about 60,000 pieces of personal data from customers, employees, business partners and job applicants. The company said it had completed a comprehensive review of the breach with outside cybersecurity experts. The leaked data had been stored by the business units known as Seiko Group Corporation (SGC), Seiko Watch Corporation (SWC) and Seiko Instruments Inc. (SII). “We have begun reaching out to each of the affected parties individually, and if any further leaks are discovered, we will, to the best of our ability, continue to respond to each affected party on an individual basis,” Seiko said. In August the Black Cat cybercrime group, also known as AlphV, took credit for the incident and soon afterward Seiko confirmed that it was a ransomware attack. Seiko did not specify what it meant by “items” of personal data, but said information falls into these categories: * Customer information from SWC, “including names, addresses, telephone numbers, and/or email addresses.” But “credit card information was not compromised.” * Contact information for “counterparties involved in business transactions with SGC, SWC, and/or SII.” That data included “name, company affiliation, job title, company address, company phone number, and/or company email address.” * Job applicant information from people seeking “employment with SGC and/or SWC, including names, addresses, phone numbers, email addresses, and/or educational background information.” Information about current and former employees of SGC, including “names and/or email addresses.” Seiko said it is continuing to review the ransomware attack while shoring up its policies and systems “to prevent any recurrence of this type of incident.” Another Japanese company with a large watchmaking business, Casio, said last week that one of its software subsidiaries had a data breach earlier in October. * * * * * Tags * Japan * BlackCat * Alphv * Data breach * Seiko Previous articleNext article Russian artists’ Spotify accounts defaced by pro-Ukraine hackers Kazakhstan-based hackers targeting gov’t websites in Central Asia, Cisco says JOE WARMINSKY Joe Warminsky is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. Most recently he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call. BRIEFS * Seiko says ransomware attack led to leak of 60,000 ‘items’ of personal dataOctober 25th, 2023 * Philadelphia: Hackers spent three months accessing city gov’t email accountsOctober 25th, 2023 * Neuberger: New global initiatives will include information sharing, ransomware payment trackingOctober 24th, 2023 * Ukraine cyber officials warn of a ‘surge’ in Smokeloader attacks on financial, government entitiesOctober 24th, 2023 * Norway issues warning after ‘important businesses’ affected by Cisco zero-daysOctober 24th, 2023 * War crimes tribunal says September cyberattack was act of espionageOctober 20th, 2023 * Business-oriented threat involving ‘several types of malware all at once’ remains activeOctober 19th, 2023 * Moldovan accused of running cybercrime marketplace to face charges in US October 19th, 2023 * Eastern European energy and defense firms targeted with MATA backdoorOctober 18th, 2023 HAMAS APPLICATION INFRASTRUCTURE REVEALS POSSIBLE OVERLAP WITH TAG-63 AND IRANIAN THREAT ACTIVITY Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity RUSSIA CREATES NO-WIN SITUATION FOR WESTERN COMPANIES Russia Creates No-Win Situation for Western Companies NEAR-SPACE IN CHINA’S MILITARY STRATEGY: STRATEGIC RECONNAISSANCE, PRECISION STRIKE, AND BATTLEFIELD ADVANTAGE Near-Space in China’s Military Strategy: Strategic Reconnaissance, Precision Strike, and Battlefield Advantage MULTI-YEAR CHINESE APT CAMPAIGN TARGETS SOUTH KOREAN ACADEMIC, GOVERNMENT, AND POLITICAL ENTITIES Multi-year Chinese APT Campaign Targets South Korean Academic, Government, and Political Entities EMPIRE DRAGON ACCELERATES COVERT INFORMATION OPERATIONS, CONVERGES WITH RUSSIAN NARRATIVES Empire Dragon Accelerates Covert Information Operations, Converges with Russian Narratives * * * * * Privacy Policy © Copyright 2023 | The Record from Recorded Future News