Thursday, January 9, 2025
HomeCyber Security NewsCasio Hacked - Servers Compromised by a Ransomware Attack

Casio Hacked – Servers Compromised by a Ransomware Attack

Published on

Casio Computer Co., Ltd. has confirmed a significant cybersecurity breach after its servers were targeted in a sophisticated ransomware attack.

The incident, which occurred on October 5, prompted an immediate forensic investigation involving external security specialists.

Casio deeply regrets any inconvenience this has caused to customers and stakeholders. The investigation revealed that unauthorized access was obtained overseas, leading to system failures and the potential leak of sensitive internal documents.

Casio has issued a series of updates, including a prior notice on October 8 regarding the unauthorized access and its consequences.

Investigation Findings

Preliminary findings indicate that while Casio has taken considerable steps to enhance its cybersecurity posture in response to a rising wave of cyber threats, gaps in defenses against phishing emails and the security of its global network—including overseas offices—were exploited.

Fortunately, the investigation did not reveal any compromise of customer databases or personal information systems.

However, it has been confirmed that sensitive internal documents containing the personal information of employees and business partners were leaked. The company is diligently working to identify affected individuals and will reach out to them directly.

Personal Information Exposed

The leaked data includes:

  • Employee Information: Details of 6,456 individuals, including names, employee numbers, emails, and internal affiliations. A subset of employees had additional personal information such as gender, date of birth, and even family details disclosed.
  • Business Partner Data: Information on 1,931 contacts across Casio and its subsidiaries, including names, email addresses, and company details.
  • Customer Information: Personal details for 91 customers, specifically related to purchases requiring delivery and installation.

While sensitive internal documents were exposed, Casio clarified that no credit card information or insider-related data was compromised.

In light of this incident, Casio is enhancing its IT security protocols across all operations, especially in its overseas offices.

The company has committed to a thorough review of its information management systems and fortifying employee training regarding cybersecurity practices.

Most services affected by the attack have resumed, although some individual services remain temporarily suspended. Casio has expressed sincere apologies for the disruption faced by its users and stakeholders.

Casio has noted that some employees have received unsolicited spam emails possibly linked to the breach.

The company urges those affected to refrain from sharing sensitive information via social media to mitigate potential secondary damage.

Casio is cooperating closely with authorities to address this issue and to take action against any malicious activities stemming from the incident.

Casio is dedicated to rectifying this breach and ensuring the continued security of its systems. The company reaffirms its commitment to providing reliable products and services while fostering a safe working environment for its employees and partners.

Casio extends its deep apologies for any distress caused by this unfortunate event.

ANY.RUN Threat Intelligence Lookup - Extract Millions of IOC's for Interactive Malware Analysis: Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

New Great Morpheus Hacker Group Claims Hacking Into Arrotex Pharmaceuticals And PUS GmbH

A Data Leak Site (DLS) belonging to a new extortion group named Morpheus, which...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New PayPal Phishing Abusing Microsoft365 Domains for Sophisticated Attacks

A new and sophisticated phishing scam has been uncovered, leveraging Microsoft 365 domains to...

APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub

The malicious Southeast Asian APT group known as OceanLotus (APT32) has been implicated in...

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...