Bose discloses data breach following ransomware attack in March, says ‘very small number’ of individuals’ data impacted- Technology News, Firstpost

0

After systems of Bose US faced a ransomware attack in March this year, the company has disclosed that its data was also breached. In an incident notification to the Attorney General, Bose disclosed that the company “experienced a sophisticated cyber-incident that resulted in the deployment of malware/ransomware across” its “environment”. Bose says that in its investigation, it found “a very small number of individuals whose data was impacted”. Bose sent notices to all affected individual. In the ransomware attack, employee personal info including names, compensation information, social security number, and other HR-related information, was exposed.

Loading...

The company also told Bleeping Computers that it did not pay any ransom, and recovered and secured its system with the help of third-party cybersecurity researchers.

Bose says that the company’s has “no ongoing disruption” to the business.

Loading...

Bose has experts monitoring the dark web for any indications of leaked data.

More than a month after the ransomware attack, on 29 April 2021, Bose says it determined that the “perpetrator of the cyber-attack potentially accessed a small number of internal spreadsheets with administrative information maintained by our Human Resources department”. “These files contained certain information pertaining to employees and former employees of Bose.”

Bose says it has experts monitoring the dark web for any indications of leaked data, and has been working with the US Federal Bureau of Investigation (FBI) on the matter.

Loading...

Bose has also implemented the following measures:

  • Enhanced malware/ransomware protection on endpoints and servers to further enhance our protection against future malware/ransomware attacks.
  • Performed detailed forensics analysis on impacted server to analyze the impact of the malware/ransomware.
  • Blocked the malicious files used during the attack on endpoints to prevent further spread of the malware or data exfiltration attempt.
  • Enhanced monitoring and logging to identify any future actions by the threat actor or similar types of attacks.
  • Blocked newly identified malicious sites and IPs linked to this threat actor on external firewalls to prevent potential exfiltration.
  • Changed passwords for all end-users and privileged users.
  • Changed access keys for all service accounts.

Also read: 

Domino’s India data breach: Name, location, mobile number, email of 18 crore orders up for sale on dark web

Loading...

Air India data breach: Personal info of flyers leaked after cyber attack on its passenger server

; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window,document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '259288058299626'); fbq('track', 'PageView');

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

Loading...

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Loading...
Denial of responsibility! TechiLive.in is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.

Leave a comment