Security News > 2021 > August > Nokia subsidiary discloses data breach after Conti ransomware attack
Image: Kabiur Rahman Riyad. SAC Wireless, a US-based Nokia subsidiary, has disclosed a data breach following a ransomware attack where Conti operators were able to successfully breach its network, steal data, and encrypt systems.
Attack detected after Conti ransomware encrypted systems.
The Nokia subsidiary found that personal information belonging to current and former employees was also stolen during the ransomware attack on August 13, following a forensic investigation conducted with the help of external cyber security experts.
"The threat actor, Conti, gained access to the SAC systems, uploaded files to its cloud storage, and then, on June 16, deployed ransomware to encrypt the files on SAC systems," SAC says in data breach notification letters sent to an undisclosed number of impacted individuals.
While the company refused to acknowledge the ransomware attack and did not provide more info on the extent of the damage, the Conti ransomware gang revealed on their leak site that they stole over 250 GB of data.
According to a recent update, the ransomware group will soon leak all the stolen files online if the Nokia subsidiary doesn't pay the ransom they demanded.
News URL
Related news
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Henry Schein discloses data breach a year after ransomware attack (source)
- Critical SonicWall SSLVPN bug exploited in ransomware attacks (source)
- NoName ransomware gang deploying RansomHub malware in recent attacks (source)
- Fortinet confirms data breach after hacker claims to steal 440GB of files (source)
- 23andMe to pay $30 million in genetics data breach settlement (source)
- Port of Seattle hit by Rhysida ransomware in August attack (source)
- AT&T pays $13 million FCC settlement over 2023 data breach (source)
- Dell investigates data breach claims after hacker leaks employee info (source)
- Disney ditching Slack after massive July data breach (source)