Seiko says ransomware attack led to leak of 60,000 ‘items’ of personal data

Jason Macuray
Japanese watchmaker Seiko announced on Wednesday that a ransomware incident initially reported this summer resulted in the breach of about 60,000 pieces of personal data from customers, employees, business partners and job applicants.

Japanese watchmaker Seiko announced on Wednesday that a ransomware incident initially reported this summer resulted in the breach of about 60,000 pieces of personal data from customers, employees, business partners and job applicants.

The company said it had completed a comprehensive review of the breach with outside cybersecurity experts. The leaked data had been stored by the business units known as Seiko Group Corporation (SGC), Seiko Watch Corporation (SWC) and Seiko Instruments Inc. (SII).

“We have begun reaching out to each of the affected parties individually, and if any further leaks are discovered, we will, to the best of our ability, continue to respond to each affected party on an individual basis,” Seiko said.

In August the Black Cat cybercrime group, also known as AlphV, took credit for the incident and soon afterward Seiko confirmed that it was a ransomware attack.

Seiko did not specify what it meant by “items” of personal data, but said information falls into these categories:

Customer information from SWC, “including names, addresses, telephone numbers, and/or email addresses.” But “credit card information was not compromised.”
Contact information for “counterparties involved in business transactions with SGC, SWC, and/or SII.” That data included “name, company affiliation, job title, company address, company phone number, and/or company email address.”
Job applicant information from people seeking “employment with SGC and/or SWC, including names, addresses, phone numbers, email addresses, and/or educational background information.”
Information about current and former employees of SGC, including “names and/or email addresses.”

Seiko said it is continuing to review the ransomware attack while shoring up its policies and systems “to prevent any recurrence of this type of incident.”

Another Japanese company with a large watchmaking business, Casio, said last week that one of its software subsidiaries had a data breach earlier in October.

BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Joe Warminsky is the news editor for Recorded Future News. He has more than 25 years experience as an editor and writer in the Washington, D.C., area. Most recently he helped lead CyberScoop for more than five years. Prior to that, he was a digital editor at WAMU 88.5, the NPR affiliate in Washington, and he spent more than a decade editing coverage of Congress for CQ Roll Call.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Kazakhstan-based hackers targeting gov’t websites in Central Asia, Cisco says

Next Post

Ukraine’s deputy minister of digital transformation on building a military tech sector from scratch

Related Posts

For Patch Tuesday, 48 updates, no zero-day flaws

Microsoft has eased us into the new new year with just 48 updates for the Windows, Office and .NET platforms. There were no zero-days for January, and no reports of publicly exposed vulnerabilities or exploited security issues.Developers of complex, line-of-business applications might need to pay particular attention to how Microsoft has updated the Message Queue system. Printing has been patched and minor updates to bluetooth and Windows shell sub-systems (shortcuts and wallpaper) require some testing before deployment.The team at Readiness has crafted a useful infographic that outlines the risks associated with each of the updates for this January release.To read this article in full, please click here
Avatar
Read More

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One
Omega Balla
Read More