Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Ransomware Group Starts Leaking Data From Japanese Watchmaking Giant Seiko

The BlackCat/ALPHV ransomware group has started publishing data allegedly stolen from Japanese watchmaking giant Seiko.

A known ransomware group on Monday started publishing data allegedly stolen from the systems of Japanese watchmaking giant Seiko.

Seiko revealed on August 10 that it had identified a possible data breach on July 28, with someone gaining access to at least one server. An investigation showed that some information may have been compromised. 

“The Company and all our Group companies kindly ask our customers and business partners to contact us immediately if you receive any suspicious or unusual emails or notifications from us,” Seiko said.

The ransomware group known as BlackCat and ALPHV has now taken credit for the attack and has started leaking files apparently taken from Seiko systems after the victim refused to respond to its extortion attempts.

The cybercriminals claim to have stolen 2 Tb worth of files, including employee information, production technology details, video and audio recordings of management meetings, emails, and copies of passports belonging to employees and foreign visitors.  

The ransomware group has published screenshots to demonstrate that they have obtained contracts and other corporate documents, confidential technical documents, passport copies, and emails. One screenshot seems to show that they still had access to Seiko email systems on August 14. 

The hackers are threatening to either sell or leak the information stolen from Seiko if the company refuses to meet their demands. 

Advertisement. Scroll to continue reading.

The BlackCat group has targeted several major companies in the past year, including Australian law firm HWL Ebsworth, Reddit, Canadian software company Constellation Software, and US payments giant NCR.

Related: Veritas Vulnerabilities Exploited in Ransomware Attacks Added to CISA ‘Must Patch’ List

Related: FBI Shares Information on BlackCat Ransomware Attacks

Related: BlackCat Ransomware Targets Industrial Companies 

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.

Register

Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Ransomware

Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.

Ransomware

US payments giant NCR has confirmed being targeted in a ransomware attack for which the BlackCat/Alphv group has taken credit.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.