Seiko says ransomware attack led to leak of 60,000 ‘items’ of personal data

Jason Macuray
Japanese watchmaker Seiko announced on Wednesday that a ransomware incident initially reported this summer resulted in the breach of about 60,000 pieces of personal data from customers, employees, business partners and job applicants.

Japanese watchmaker Seiko announced on Wednesday that a ransomware incident initially reported this summer resulted in the breach of about 60,000 pieces of personal data from customers, employees, business partners and job applicants.

The company said it had completed a comprehensive review of the breach with outside cybersecurity experts. The leaked data had been stored by the business units known as Seiko Group Corporation (SGC), Seiko Watch Corporation (SWC) and Seiko Instruments Inc. (SII).

“We have begun reaching out to each of the affected parties individually, and if any further leaks are discovered, we will, to the best of our ability, continue to respond to each affected party on an individual basis,” Seiko said.

In August the Black Cat cybercrime group, also known as AlphV, took credit for the incident and soon afterward Seiko confirmed that it was a ransomware attack.

Seiko did not specify what it meant by “items” of personal data, but said information falls into these categories:

Customer information from SWC, “including names, addresses, telephone numbers, and/or email addresses.” But “credit card information was not compromised.”
Contact information for “counterparties involved in business transactions with SGC, SWC, and/or SII.” That data included “name, company affiliation, job title, company address, company phone number, and/or company email address.”
Job applicant information from people seeking “employment with SGC and/or SWC, including names, addresses, phone numbers, email addresses, and/or educational background information.”
Information about current and former employees of SGC, including “names and/or email addresses.”

Seiko said it is continuing to review the ransomware attack while shoring up its policies and systems “to prevent any recurrence of this type of incident.”

Another Japanese company with a large watchmaking business, Casio, said last week that one of its software subsidiaries had a data breach earlier in October.

BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. Most recently he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Kazakhstan-based hackers targeting gov’t websites in Central Asia, Cisco says

Next Post

Ukraine’s deputy minister of digital transformation on building a military tech sector from scratch

Related Posts

ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor

Russian organizations have been targeted by a cybercrime gang called ExCobalt using a previously unknown Golang-based backdoor known as GoRed. "ExCobalt focuses on cyber espionage and includes several members active since at least 2016 and presumably once part of the notorious Cobalt Gang," Positive Technologies researchers Vladislav Lunin and Alexander Badayev said in a technical report
Avatar
Read More