Wednesday, December 18, 2024
HomeCyber Security NewsWestern Digital Network Breach - Hackers Gained Access to Company Servers

Western Digital Network Breach – Hackers Gained Access to Company Servers

Published on

SIEM as a Service

Western Digital (WD), a renowned manufacturer of Scandisk drives, has announced a data breach on its network, resulting in unauthorized access to data on multiple systems by attackers.

WD is a company based in the United States that specializes in manufacturing computer drives and data storage devices, providing data center systems, and offering customers cloud storage services.

The incident is ongoing, so the Company has promptly deployed incident responders and collaborated with digital forensic experts to investigate the attack.

- Advertisement - SIEM as a Service

“Western Digital identified a network security incident involving Western Digital’s systems. In connection with the ongoing incident, an unauthorized third party gained access to a number of the Company’s systems.” WD said in a Press release.

“The Company is implementing proactive measures to secure its business operations, including taking systems and services offline, and will continue taking additional steps as appropriate.”

Additionally, the Company has stated that they are actively working on restoring the affected systems. They suspect that the unauthorized party obtained detailed data from their systems and are striving to comprehend the nature and extent of that data.

As a result of this incident, several users reported that My Cloud, another cloud operating service, experienced over 12 hours of downtime.

“Our team is working urgently to resolve the issue and restore access as soon as possible. We apologize for any inconvenience this may cause and appreciate your patience.”

According to their incident report, “We are experiencing a service interruption preventing customers from accessing the My Cloud, My Cloud Home, My Cloud Home Duo, My Cloud OS 5, SanDisk ibi, SanDisk Ixpand Wireless Charger service.”

Following the attack, the storage manufacturer has taken further security measures to protect its systems and operations, which may affect some of Western Digital’s services.

Here the following products are impacted by this security incident:

My Cloud
My Cloud Home
My Cloud Home Duo
My Cloud OS5
SanDisk ibi
SanDisk Ixp
Wireless Charger

We attempted to contact Western Digital for further information on the incident but did not receive a response. We will provide updates to the article as soon as they become available.

Searching to secure your APIs? – Try Free API Penetration Testing

Related Read:

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...

Earth Koshchei Employs RDP Relay, Rogue RDP server in Server Attacks

 A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

New VIPKeyLogger Via Weaponized Office Documenrs Steals Login Credentials

The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing...

INTERPOL Urges to End ‘Pig Butchering’ & Replaces With “Romance Baiting”

INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase...

New I2PRAT Malware Using encrypted peer-to-peer communication to Evade Detections

Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT,"...