Seiko Targeted by BlackCat/ALPHV Ransomware Gang

The renowned watchmaker Seiko has fallen victim to a cyberattack by the BlackCat/ALPHV ransomware gang, who have recently claimed responsibility for the incident. This comes after Seiko disclosed the breach earlier this month.

Seiko, a historic watchmaker with a global presence, boasts a workforce of approximately 12,000 employees and generates an annual revenue exceeding $1.6 billion.

On August 10th, 2023, Seiko issued a notice regarding a data breach, revealing that an unauthorized third party had gained access to a portion of its IT infrastructure and had potentially exfiltrated or accessed data.

According to Seiko’s announcement, “[on July 28, 2023] some as-yet-unidentified party or parties gained unauthorized access to at least one of our servers.” In response, Seiko enlisted the help of external cybersecurity experts on August 2nd to investigate and assess the situation.

Seiko expressed regret to potentially affected customers and business partners and advised them to remain vigilant against potential communication attempts impersonating the company.

BlackCat Takes Credit

The BlackCat ransomware group has now proclaimed responsibility for the attack on Seiko. They have even published samples of the data they claim to have stolen during the breach.

The leaked data includes production plans, employee passport scans, new model release plans, specialized lab test results, and confidential technical schematics and Seiko watch designs.

Seiko listed on ALPHV website
Source: BleepingComputer

This indicates that BlackCat likely possesses detailed internal information about Seiko, including patented technology, which could be detrimental if made public and exposed to competitors and imitators.

BlackCat is a highly sophisticated and notorious ransomware gang that primarily targets businesses. They continuously evolve their extortion tactics, as evidenced by their use of a dedicated clearweb website for leaking victim data and the recent creation of a data leak API, which facilitates the distribution of stolen information.

BleepingComputer reached out to Seiko for additional comments on the claims made by the threat actors, but as of the time of publication, no response has been received.

Leave a Reply

Your email address will not be published. Required fields are marked *