Security News > 2021 > April > Capcom Says Older VPN Device at Heart of Ransomware Attack
Japanese video game giant Capcom revealed on Tuesday that, as part of the November 2020 ransomware attack, adversaries targeted an older backup VPN device for initial access.
"As described in previous announcements, none of the at-risk data contains credit card information. All online transactions etc. are handled by a third-party service provider on a separate system, and as such Capcom does not maintain any such information internally," Capcom says.
According to the game maker, its investigation into the incident has revealed that an older backup VPN device maintained at the North American subsidiary was leveraged as an entry point into the company's internal network.
At the time, the company says, the North American subsidiary, just as the entire Capcom Group, had transitioned to a new model of VPN devices, but the spread of COVID-19 in the State of California had forced it to keep older VPN devices as an emergency backup.
The attackers breached the older devices to compromise systems at Capcom offices in the U.S. and Japan, which resulted in data theft.
At the next stage of attack, on November 1, ransomware was dropped on systems at both Capcom U.S. and Japan offices, and data on those systems was encrypted.
News URL
Related news
- New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data (source)
- CISA warns of Jenkins RCE bug exploited in ransomware attacks (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- Most ransomware attacks occur between 1 a.m. and 5 a.m. (source)
- Lateral movement: Clearest sign of unfolding ransomware attack (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)
- U.S. Agencies Warn of Iranian Hacking Group's Ongoing Ransomware Attacks (source)
- Ransomware crisis deepens as attacks and payouts rise (source)
- Ransomware attacks escalate as critical sectors struggle to keep up (source)