Technology

JVCKenwood hit by Conti ransomware attack

Nearly about 2TB of records used to be stolen from Japanese electronics firm in a Conti ransomware hit

Alex Scroxton

By

Published: 01 Oct 2021 10: 37

Japan-based mostly electronics supplier JVCKenwood has change into the most up-to-date known victim in a renewed wave of Conti ransomware attacks that are spreading around the realm.

Little print of the attack got by Laptop Weekly’s sister title LeMagIT speak that Conti has exfiltrated about 1.7TB of JVCKenwood’s records, alongside side for my fragment identifiable knowledge (PII) on its staffers, some of which used to be equipped to the firm as proof of the attack.

The Conti gang is tense a ransom of $7m (£5.2m/€6m) and claims to relish stolen records on JVCKenwood prospects and suppliers, and records concerning its moral, financial, HR, IT, audit and compliance functions. This entails deepest paperwork, telephone numbers, contact facts, and payroll and banking statements.

On the opposite hand, on the time of writing, discussions between a JVCKenwood representative and Conti’s negotiator looked as if it would relish ground to a discontinue, which could perchance presumably perchance be a advice that the firm will refuse to pay a ransom.

As has been customarily noticed in its totally different Conti attacks, the crew continues to act as whether it’s miles providing a official penetration making an strive out and safety audit carrier. In screengrabs of the negotiations viewed by Laptop Weekly, it said: “Fortunately, Conti is here to quit any extra damages.”

The crew goes on to provide damage prevention and mitigation companies and products, and warns the victim that if it does leak their knowledge, their records will seemingly be abused by darkish web cyber criminals for his or her have “spoiled applications”.

The ransom label goes on to warn that the attack will terminate in moral, regulatory and reputational penalties.

It adds: “There could be rarely any such thing as a fashion that we shouldn’t be any longer going to fulfil our guarantees after you pay. The possibilities that hell will freeze are higher than us deceptive our prospects.”

In an official observation, JVCKenwood said that it detected unauthorised access to servers situated in Europe on 22 September 2021.

“It used to be realized that there used to be a possibility of records leak by the third occasion who made the unauthorised access,” said a firm spokesperson.

“For the time being, a detailed investigation is being performed by the specialised agency out of doors the firm in collaboration with the relevant authorities. No customer records leak has been confirmed at the present.

“JVCKenwood takes this incident very seriously, and sincerely regrets the disaster it could perchance presumably perchance furthermore merely trigger.”

Described by Palo Alto Networks’ Unit 42 team as one of the most extra ruthless extant ransomware gangs, Conti has been around for over a year and has made immense sums by extorting victims equivalent to hospitals, for whom IT disruption could perchance presumably perchance furthermore repeat existence-threatening. In Would per chance presumably presumably, the gang attacked Ireland’s Health Service Executive in a $19.9m attack that continues to relish an affect on companies and products nearly about six months later.

Counter to the gang’s emotions on the subject, Unit 42 also describes Conti as unreliable. “We’ve viewed the neighborhood stiff victims who pay ransoms, waiting for so that you just can obtain better their records,” wrote Richard Hickman, a senior incident response e-book on the firm.

A recent leak of records on the Conti operation, supposedly by a disgruntled affiliate, published extra perception into how the neighborhood goes about reconnoitring and compromising its victims, alongside side knowledge on customarily unpatched vulnerabilities that it has had issue success at exploiting, equivalent to PrintNightmare, ZeroLogon and EternalBlue. Additional knowledge on Conti is on hand from the US Cyber Safety and Infrastructure Safety Company.

Read extra on Hackers and cybercrime prevention

Related Articles

Back to top button
%d bloggers like this: