Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Europe

Hyundai Europe confirms that it has suffered a large-scale ransomware attack

thedailyposting.comBy thedailyposting.comFebruary 9, 2024No Comments

[ad_1]

Hyundai Motor Europe, the European arm of the South Korean automaker, has admitted that it suffered a ransomware attack earlier this year.

In early January, news broke that a cyber incident had occurred within the company, but Hyundai quickly shot down the story and claimed it was simply an “IT issue.”

but, peepee computer After discovering new evidence pointing to the data theft incident, Hyundai came clean and confessed.

serious threat

“Hyundai Motor Europe is investigating an incident in which an unauthorized third party gained access to a limited portion of Hyundai Motor Europe’s network,” Hyundai Motor Europe said in a statement.

“Our investigation is ongoing and we are working closely with external cybersecurity and legal experts. Relevant local authorities have also been informed. Trust and security are fundamental to our business. , our priority is to protect our customers, employees, investors, and customers.”Partners. ”

Further details are available, including who carried out the attack, what kind of information was stolen (customer data, employee data, partner data, or something else entirely), whether there was a ransom demand, and what it was. This has not yet been disclosed by the company. So far, reports from BleepingComputer say that it was the Black Basta ransomware attackers who organized the attack, and that about 3 terabytes of his data were retrieved.

The publication claims to have identified a list of folders that may have been stolen from various Windows domains, including one from KIA Europe. The folder names suggest that the data belongs to the Legal, Sales, Human Resources, Accounting, IT, and Administration departments.

Black Basta was first seen in April 2022 and has since grown to become one of the largest and most dangerous ransomware operators.

Late last year, a Sophos report stated that a number of ransomware operators, including Black Basta, began intentionally using remote encryption, an ultra-destructive method of ransomware attacks. The company’s anti-ransomware CryptoGuard technology detected a 62% year-over-year increase in deliberate remote encryption attacks.

Learn more about TechRadar Pro

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip

June 29, 2024

Heatwaves in Europe are becoming more dangerous: what it means for travelers

June 28, 2024

Mifflin County Travel Club’s European Adventures | News, Sports, Jobs

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.