wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/05\/03\/avidxchange-second-ransomware-attack-2023\/<\/a><\/br> Hackers have published a trove of sensitive data stolen from payment software company AvidXchange<\/a> after the company fell victim to ransomware for the second time this year.<\/p>\n AvidXchange provides cloud-based software that helps organizations automate invoice processing and payment management processes. The North Carolina-based company says it processed 70 million transactions for 8,000 customers in 2022.<\/p>\n A ransomware group called RansomHouse claimed responsibility for the recent cyberattack on AvidXchange.<\/p>\n \u201cDear AvidXchange, We strongly recommend you to contact us to prevent your confidential data, documents from being leaked,\u201d a message on RansomHouse\u2019s dark web leak site reads.<\/p>\n A sample of the stolen data, seen by TechCrunch, includes non-disclosure agreements, employee payroll information and corporate bank account numbers.<\/p>\n The leak also includes login details, including usernames, passwords and, in some cases, answers to security questions for a variety of the company\u2019s systems, including cloud accounts and security software, through to smart door locks and surveillance cameras. The leaked login details suggest that AvidXchange uses easily guessable passwords with derivations of the company\u2019s name and the word \u201cpassword\u201d itself. Notes in the document suggest many of the logins may still be in use.<\/p>\n In a short statement<\/a> on its website, AvidXchange said the incident \u201caffected some of our systems and data.\u201d The company said its investigation is ongoing, but confirmed that it detected in early April that \u201csome data from these systems was exfiltrated.\u201d<\/p>\n AvidXchange said during the company\u2019s first-quarter earnings call on Monday that it expects to incur costs related to the incident, but spokesperson Olivia Sorrells declined to tell TechCrunch whether the company received or paid a ransom demand from RansomHouse or answer TechCrunch\u2019s questions.<\/span><\/p>\n RansomHouse, which has been active since 2021, describes itself as a \u201cprofessional mediators community\u201d that targets organizations with a \u201cnegligent attitude to the privacy and security of their customers\u2019 personal data.\u201d The ransomware gang also recently claimed chipmaker <\/a>AMD and Africa\u2019s largest retailer <\/a>Shoprite as victims.<\/p>\n It remains unclear how AvidXchange was compromised, how many customers and employees are affected by the breach and whether AvidXchange has the means to determine what data was exfiltrated from its systems.<\/p>\n This latest breach comes just weeks after AvidXchange confirmed it was one of the 130 victims of the mass-hack targeting Fortra GoAnywhere systems<\/a>, which was claimed by the Russia-speaking Clop ransomware gang. AvidXchange told TechCrunch at the time that the company used Fortra\u2019s GoAnywhere technology to transfer files to a specific company that prints its checks.<\/p>\n Clop\u2019s dark web leak site currently lists data it allegedly stole from AvidXchange, including the company\u2019s GoAnywhere backups.<\/p>\n Do you have more information about the AvidXchange cyberattack? You can contact Carly Page securely on Signal at +441536 853968, or by email<\/a>. You can also contact TechCrunch via\u00a0SecureDrop<\/a>.<\/em><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nPayment software giant AvidXchange suffers its second ransomware attack of 2023<\/br>
\n2023-05-03 21:40:26<\/br><\/p>\n
\n