wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/04\/13\/hackers-claim-vast-access-to-western-digital-systems\/<\/a><\/br> The hackers who<\/span> breached data storage giant Western Digital claim to have stolen around 10 terabytes of data from the company, including reams of customer information. The extortionists are pushing the company to negotiate a ransom \u2014 of \u201cminimum 8 figures\u201d \u2014 in exchange for not publishing the stolen data.<\/p>\n On April 3, Western Digital disclosed \u201ca network security incident\u201d<\/a> saying hackers had exfiltrated data after hacking into \u201ca number of the Company\u2019s systems.\u201d At the time, Western Digital provided few details about exactly what data the hackers stole, saying in a statement<\/a> that the hackers \u201cobtained certain data from its systems and [Western Digital] is working to understand the nature and scope of that data.\u201d<\/p>\n One of the hackers spoke with TechCrunch and provided more details, with the goal of verifying their claims. The hacker shared a file that was digitally signed with Western Digital\u2019s code-signing certificate, showing they could now digitally sign files to impersonate Western Digital. Two security researchers also looked at the file and agreed it is signed with the company\u2019s certificate.<\/p>\n The hackers also shared phone numbers allegedly belonging to several company executives. TechCrunch called the numbers. Most of the calls rang but went to automated voicemail messages. Two of the phone numbers had voicemail greetings that mentioned the names of the executives that the hackers claimed were associated with the numbers. The two phone numbers are not public.<\/p>\n Screenshots shared by the hacker show a folder from a Box account apparently belonging to Western Digital, an internal email, files stored in a PrivateArk instance (a cybersecurity product), and a screenshot of a group call where one of the participants is identified as Western Digital\u2019s chief information security officer.<\/p>\n They also said they were able to steal data from the company\u2019s SAP Backoffice, a backend interface that helps companies manage e-commerce data.<\/p>\n The hacker said that their goal when they hacked Western Digital was to make money, though they decided against using ransomware to encrypt the company\u2019s files.<\/p>\n \u201cI want to give them a chance to pay but our callers [\u2026] they have called them many times. They don\u2019t answer and if they do they listen and hang up,\u201d the hacker said.<\/p>\n The hacker said they have also emailed several executives \u2014 using their personal email addresses because the corporate email system is currently down \u2014 demanding a \u201cone-time payment.\u201d<\/p>\n \u201cWe are the vermin who breached your company. Perhaps your attention is needed!\u201d the hackers wrote, according to a copy of the email the hackers shared with TechCrunch. \u201cContinue down this path and we will retaliate.\u201d<\/p>\n \u201cWe only need a one-time payment, and then we will leave your network and let you know about your weaknesses. No lasting harm has been done. But if there are any efforts to interfere with us, our systems, or anything else. We will strike back,\u201d the hackers continued. \u201cWe are still buried in your network and we will keep digging there until we find a payment from you. We can completely conceal this and make it all disappear. Before it is too late, let us do that. Until now, you have been gracious; Let\u2019s hope that you do not keep going the wrong way.\u201d<\/p>\n \u201cCut the crap, get the money, and let\u2019s both go our separate ways. Simply put, let us put our egos aside and work to find a resolution to this chaotic scenario,\u201d the hackers wrote.<\/p>\n Western Digital spokesperson Charlie Smalling said the company declined to comment or answer questions about the hacker\u2019s claims, such as whether the company could confirm the amount of data stolen, if it included customer data, and whether the company had made contact with the hackers.<\/p>\n The hacker who spoke to TechCrunch declined to specify what kind of customer data they have, how they originally broke into Western Digital\u2019s network, and how they maintained access to the company\u2019s network.<\/p>\n \u201cI can say that we exploited vulnerabilities within their infrastructure and spidered our way to global administrator of their [Microsoft] Azure tenant<\/a>,\u201d the hacker said.<\/p>\n As for why they hacked Western Digital, the hacker said they just come up with targets \u201crandomly.\u201d They also declined to say anything about themselves or the group, saying they don\u2019t go by any name.<\/p>\n If Western Digital doesn\u2019t get back to them, the hacker said, they are ready to start publishing the stolen data on the website of the ransomware gang Alphv<\/a>. The hacker said they are not directly affiliated with Alphv but \u201cI know them to be professional.\u201d<\/p>\n Do you have more information about the Western Digital hack? We\u2019d love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Wickr, Telegram and Wire @lorenzofb, or email lorenzo@techcrunch.com<\/a>. You can also contact TechCrunch via\u00a0SecureDrop<\/a>.<\/em><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nHackers claim vast access to Western Digital systems<\/br>
\n2023-04-13 21:58:30<\/br><\/p>\n
\n