Sunday, March 2, 2025
HomeCyber AttackTargus Hacked: Attackers Gain Access to File Servers

Targus Hacked: Attackers Gain Access to File Servers

Published on

SIEM as a Service

Follow Us on Google News

Targus International, LLC and its affiliates fell victim to a sophisticated cyberattack.

The company, an indirect subsidiary of B. Riley Financial, Inc., announced that an unauthorized entity breached its file systems, prompting an immediate and robust response to mitigate the damage.

Upon detecting the intrusion, Targus wasted no time mobilizing its incident response team.

With the aid of external cybersecurity experts, the company embarked on a thorough investigation to understand the scope and impact of the breach.

Efforts to contain the incident temporarily halted Targus’ business operations, highlighting the severity of the attack and the company’s commitment to security.

Document
Run Free ThreatScan on Your Mailbox

AI-Powered Protection for Business Email Security

Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .

Recovery and Impact Assessment

Targus has since managed to contain the breach and is currently in the process of recovering its systems.

The company remains vigilant, with ongoing investigations to address all vulnerabilities.

Despite the temporary disruption, Targus and B. Riley Financial, Inc. are confident that the incident will not have a material impact on their financial health or operational results, as reported by the US Securities and Exchange Commission.

Targus has notified the relevant regulatory authorities about the breach, which aligns with its commitment to transparency and legal compliance.

The company also cooperates with law enforcement agencies to trace the perpetrators and prevent future incidents.

This collaborative approach highlights Targus’ dedication to safeguarding its stakeholders’ interests.

Targus’ announcement includes forward-looking statements that caution stakeholders about risks and uncertainties.

These statements reflect the company’s current expectations based on the information available at the time.

However, they are subject to change, and the company commits to updating the public as new information becomes available.

The cyberattack on Targus is a stark reminder of the ever-present threats in the digital world.

While the breach has caused temporary disruptions, Targus’ swift response and comprehensive recovery plan demonstrate strength in adversity.

As the company continues to navigate this challenging time, its actions set a precedent for how businesses can effectively respond to and recover from cyber threats.

Secure your emails in a heartbeat! Take Trustifi's free 30-second assessment and get matched with your ideal email security vendor - Try Here

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...