Security News > 2021 > April > Capcom: Ransomware gang used old VPN device to breach the network
Capcom has released a final update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals.
In early November 2020, Ragnar Locker ransomware hit the Japanese game developer and publisher, forcing Capcom to shut down portions of their network.
In typical fashion for human-operated ransomware attacks, the threat actor stole sensitive information before encrypting devices on the network.
Today, Capcom announced that restoring the internal systems affected by the attack is almost finished and that the investigation into the incident has completed.
Investigators discovered that Ragnar Locker operators gained access to Capcom's internal network by targeting an old VPN backup device located at the company's North American subsidiary in California.
Capcom says that it was in the process of boosting network defenses when Ragnar Locker threat actor breached its network.
News URL
Related news
- Fog ransomware targets SonicWall VPNs to breach corporate networks (source)
- Helldown ransomware exploits Zyxel VPN flaw to breach networks (source)
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Henry Schein discloses data breach a year after ransomware attack (source)
- Black Basta ransomware poses as IT support on Microsoft Teams to breach networks (source)
- LA housing authority confirms breach claimed by Cactus ransomware (source)