SEIKO Cyber Attack: Customers Personal Data Exposed

SEIKO Group Corporation (SGC) has announced that they suffered a cyber attack that exposed customer data. 

The attack lasted for several months and was ransomware that accessed SEIKO’s servers without permission. 

The attack was discovered on July 28, 2023, and SEIKO immediately stopped it.

SEIKO hired cybersecurity experts to investigate and report the attack to the authorities. 

They also set up an emergency team to limit the damage. After checking their servers, they discovered about 60,000 pieces of personal data from SGC, Seiko Watch Corporation (SWC), and Seiko Instruments Inc. (SII) were leaked.

SEIKO Cyber Attack

The data included customer names, business contacts, job applicants, and staff information.

SEIKO has done several things to fix the problem and avoid future attacks. 

They cut off external communication with the affected servers and installed new systems to detect and block unauthorized activity. 

They also added more security features, such as multi-factor authentication.

SEIKO is still working with cybersecurity experts to find and fix any weaknesses in their IT systems, figure out the full extent of the data leak, understand how and why the attack happened, improve system security and monitoring, strengthen corporate governance across the Group, review their Business Continuity Plan (BCP), and get third-party assessments and other actions to prevent such incidents from happening again.

SEIKO Group Corporation apologized for the trouble caused by this data leak. 

They have contacted the affected parties individually and are ready to deal with any more leaks that may be found later. 

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

2 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

2 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

2 hours ago

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…

2 hours ago

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…

2 hours ago

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…

2 hours ago