Saturday, June 22, 2024

Western Digital Hack – Attackers Demanding “Minimum 8 Figures” as Ransom

WD (Western Digital), the data storage solutions provider, recently announced a distressing announcement.

In a cybersecurity incident, their network suffered a data breach that allowed threat actors to unauthorizedly access data across multiple systems.

Threat actors behind the recent cyber attack on Western Digital (WD) have proclaimed the responsibility for unauthorizedly stealing approximately 10 terabytes of data from the company’s systems.

Data Breach

The hackers responsible for this data breach are now attempting to extort the company by demanding a ransom of no less than 8 figures. 

The extortionists allegedly threaten to publish the sensitive data they have stolen if their demands are unmet. The company affirmed that the attackers had gained access to several of its systems and exfiltrated data from those systems.

Here’s what Western Digital stated:-

“In connection with the ongoing incident, an unauthorized third party gained access to a number of the Company’s systems.” 

While after this event, Western Digital released a statement claiming they are actively investigating the scope of the breach and the compromised data. 

They did not disclose any detailed information on the nature of the stolen data. Apart from this, WD is actively working to fix all its business operations by implementing all the necessary security measures.

There has been a significant impact on the services offered by Western Digital due to this recent security breach. As multiple users have reported several issues with “My Cloud,” it’s one of its cloud operating services.

Affected Services

Here below, we have mentioned all the services that are drastically impacted and are not accessible at the moment by several users:-

  • My Cloud
  • My Cloud Home
  • My Cloud Home Duo
  • My Cloud OS 5
  • SanDisk ibi
  • SanDisk Ixpand Wireless Charger service

Hackers’ Claim

To confirm their claims, one of the hackers behind the recent Western Digital data breach spoke with TechCrunch, revealing more information about the incident. 

During the conversation, the hacker shared a file that had been digitally signed with Western Digital’s code-signing certificate. 

This file demonstrated the ability of the hackers to impersonate Western Digital by digitally signing files, raising concerns about the potential for further attacks or malicious activity.

Not only that, even several company executives’ phone numbers were also allegedly exposed by the hackers. The hackers claimed to have left voicemail greetings that mentioned their names in two phone numbers.

Despite their intention to encrypt Western Digital’s files with ransomware, the hackers said they aimed to make money.

The hacker asserted that they would start publishing the compromised data on ransomware gang Alphv’s website if they didn’t receive any response from Western Digital.

Network Security Checklist – Download Free E-Book

Also Read:

Pakistan Hackers Attack Indian Edu Sectors Using Weaponised Office Documents

Hacker Group Selling Stolen Databases From Public Authorities

Balada Injector – Massive Ongoing WordPress Malware Infected Over 1 Million Websites


Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles