Monday, June 16, 2025
HomeCyber AttackSEIKO Cyber Attack: Customers Personal Data Exposed

SEIKO Cyber Attack: Customers Personal Data Exposed

Published on

SIEM as a Service

Follow Us on Google News

SEIKO Group Corporation (SGC) has announced that they suffered a cyber attack that exposed customer data. 

The attack lasted for several months and was ransomware that accessed SEIKO’s servers without permission. 

The attack was discovered on July 28, 2023, and SEIKO immediately stopped it.

- Advertisement - Google News

SEIKO hired cybersecurity experts to investigate and report the attack to the authorities. 

They also set up an emergency team to limit the damage. After checking their servers, they discovered about 60,000 pieces of personal data from SGC, Seiko Watch Corporation (SWC), and Seiko Instruments Inc. (SII) were leaked.

SEIKO Cyber Attack 

The data included customer names, business contacts, job applicants, and staff information.

SEIKO has done several things to fix the problem and avoid future attacks. 

They cut off external communication with the affected servers and installed new systems to detect and block unauthorized activity. 

They also added more security features, such as multi-factor authentication.

SEIKO is still working with cybersecurity experts to find and fix any weaknesses in their IT systems, figure out the full extent of the data leak, understand how and why the attack happened, improve system security and monitoring, strengthen corporate governance across the Group, review their Business Continuity Plan (BCP), and get third-party assessments and other actions to prevent such incidents from happening again.

SEIKO Group Corporation apologized for the trouble caused by this data leak. 

They have contacted the affected parties individually and are ready to deal with any more leaks that may be found later. 

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...