SEIKO Discloses Data Breach

SEIKO

Established in 1975, SEIKO NPC Corporation is a Japanese company specializing in manufacturing semiconductors and related solid-state devices. With a workforce of around 12,000 employees, the company has made significant contributions to the tech industry.

Discovery of Data Breach

Recently, cybersecurity experts uncovered a data breach notification on SEIKO’s website, originally posted on August 10th. This notification gained attention after the notorious ransomware group BlackCat added SEIKO to its data leak platform. The company described the incident as a “possible” data breach without divulging detailed information.

On August 10th, SEIKO confirmed that a potential data breach occurred on July 28th. Unauthorized parties gained access to at least one of the company’s servers. BlackCat (ALPHV) claimed responsibility for the breach and presented evidence on their data leak site, including sensitive information related to SEIKO’s director.

Cybersecurity Expert Investigation

External cybersecurity experts conducted a thorough investigation into the breach. SEIKO has expressed a high level of confidence that a breach took place and acknowledges the possibility of compromised company information. The company is currently in the process of identifying the specific data stored on the affected servers. As soon as conclusive results are obtained from the ongoing investigation, SEIKO plans to release further details.

Introduction to ALPHV/BlackCat Ransomware

ALPHV/BlackCat ransomware emerged in 2021 as a significant cyber threat. The group operates on a ransomware-as-a-service (RaaS) model, providing malware subscriptions to criminal actors. Notably, the gang employs the Rust programming language for its operations. Microsoft’s analysis reveals that threat actors associated with this ransomware have collaborated with other notorious ransomware families like Conti, LockBit, and REvil.

Network and Activities

Evidence suggests a connection between money launderers associated with the ALPHV/BlackCat group and well-known ransomware cartels like Darkside and Blackmatter. This hints at a sophisticated and established network within the RaaS realm. Recent data indicates that ALPHV/BlackCat has been highly active. According to cybersecurity analyst ANOZR WAY, the group was responsible for approximately 12% of all ransomware attacks in 2022.

The gang has recently targeted professional service providers. In a notable incident, they claimed to have breached Mazars Group, an international audit, accounting, and consulting firm, in mid-May.

Leave a Reply