Saturday, February 22, 2025
HomeCyber AttackWestern Digital Hack - Attackers Demanding "Minimum 8 Figures" as Ransom

Western Digital Hack – Attackers Demanding “Minimum 8 Figures” as Ransom

Published on

SIEM as a Service

Follow Us on Google News

WD (Western Digital), the data storage solutions provider, recently announced a distressing announcement.

In a cybersecurity incident, their network suffered a data breach that allowed threat actors to unauthorizedly access data across multiple systems.

Threat actors behind the recent cyber attack on Western Digital (WD) have proclaimed the responsibility for unauthorizedly stealing approximately 10 terabytes of data from the company’s systems.

Data Breach

The hackers responsible for this data breach are now attempting to extort the company by demanding a ransom of no less than 8 figures. 

The extortionists allegedly threaten to publish the sensitive data they have stolen if their demands are unmet. The company affirmed that the attackers had gained access to several of its systems and exfiltrated data from those systems.

Here’s what Western Digital stated:-

“In connection with the ongoing incident, an unauthorized third party gained access to a number of the Company’s systems.” 

While after this event, Western Digital released a statement claiming they are actively investigating the scope of the breach and the compromised data. 

They did not disclose any detailed information on the nature of the stolen data. Apart from this, WD is actively working to fix all its business operations by implementing all the necessary security measures.

There has been a significant impact on the services offered by Western Digital due to this recent security breach. As multiple users have reported several issues with “My Cloud,” it’s one of its cloud operating services.

Affected Services

Here below, we have mentioned all the services that are drastically impacted and are not accessible at the moment by several users:-

  • My Cloud
  • My Cloud Home
  • My Cloud Home Duo
  • My Cloud OS 5
  • SanDisk ibi
  • SanDisk Ixpand Wireless Charger service

Hackers’ Claim

To confirm their claims, one of the hackers behind the recent Western Digital data breach spoke with TechCrunch, revealing more information about the incident. 

During the conversation, the hacker shared a file that had been digitally signed with Western Digital’s code-signing certificate. 

This file demonstrated the ability of the hackers to impersonate Western Digital by digitally signing files, raising concerns about the potential for further attacks or malicious activity.

Not only that, even several company executives’ phone numbers were also allegedly exposed by the hackers. The hackers claimed to have left voicemail greetings that mentioned their names in two phone numbers.

Despite their intention to encrypt Western Digital’s files with ransomware, the hackers said they aimed to make money.

The hacker asserted that they would start publishing the compromised data on ransomware gang Alphv’s website if they didn’t receive any response from Western Digital.

Network Security Checklist – Download Free E-Book

Also Read:

Pakistan Hackers Attack Indian Edu Sectors Using Weaponised Office Documents

Hacker Group Selling Stolen Databases From Public Authorities

Balada Injector – Massive Ongoing WordPress Malware Infected Over 1 Million Websites

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer...

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing...

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a...