After Rubrik, Hitachi Energy issued a public statement that some of its customer accounts might have been compromised, after a ransomware attack took place on a third-party software called Fortra GoAnywhere MFT.

Clop ransomware gang is the company that managed to infiltrate the servers and siphon data and a portion of employee data might have been compromised.

Hitachi says that it disconnected the server as soon as it learnt about the incident and deployed a team of cybersecurity experts to analyze and mitigate the risks associated with the malware attack.

Thus, Hitachi is the second company after Rubrik, that was hit by Clop ransomware.

Information is also out that the same gang was also behind the data breach of personal details of over 35,000 PayPal users. The financial services provider is facing a lawsuit from one of the victims, who was notified about the data breach in January this year. And according to him, the data steal took place in December 2023 and hackers accessed details such as names, addresses, phone numbers, email addresses, DOBs, social security numbers and bank account details, along with the residual balances in respective PayPal accounts.

However, an authenticity on this info is awaited and will only be known, as the case starts unfolding, in the court of law.

NOTE- Fortra GoAnywhere MFT is a file transfer solution that is used to exchange information. It assists companies in automating file transfers in a centralized form and keeps a tab on file transfers and user access. The vulnerability on the software was fixed by Fortra in the first week of February this year. However, it seems like some customers missed out on the update.

 

The post Hitachi becomes the next victim after a ransomware attack on GoAnywhere software appeared first on Cybersecurity Insiders.

A recent survey conducted on IT leaders by Hitachi ID discovered that half of them are found storing passwords on shared document files, triggering security and privacy concerns.

Hitachi, which recently strolled into the Identity Management, conducted a poll to take the feedback from over 100 IT leaders such as CIOs and CTOs working in companies operating in EMEA and North American regions.

And to its surprise, Hitachi ID discovered that half of the tech people were not following the basics while securing their digital passwords.

Hitachi estimates each professional is nowadays dealing with applications that need password access and so they are required to store at least 70-100 passwords in their work environments.

However, most of them are found storing their passwords in centralized platforms or shared docs, leaving access to those files to anyone in their work group.

Such laxity in storing passwords often leads to security issues, such as data steal, cyber attacks or data destruction.

For instance, a corporate employee working for a reputed IT company destroyed about 21GB of data, including 20k files and almost 3500 directories to retaliate his sudden job removal. And investigations later revealed that the data wipeout was conducted from shared and backed up folders hinting a recovery next to impossible, thereafter.

Surprisingly, about 29% of respondents admitted in the Hitachi ID study they experienced a loss of access to systems after an employee was fired from their work ecosystem.

 

The post IT and Security leaders are sharing passwords in shared documents folders appeared first on Cybersecurity Insiders.