Security News > 2023 > February > A10 Networks confirms data breach after Play ransomware attack
The California-based networking hardware manufacturer 'A10 Networks' has confirmed to BleepingComputer that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data.
A10 Networks specializes in the manufacturing of software and hardware application delivery controllers, identity management solutions, and bandwidth management appliances, while it also offers firewall and DDoS threat intelligence and mitigation services.
The company's investigation determined that the threat actors managed to gain access to shared drives, deployed malware, and 'compromised' data related to human resources, finance, and legal functions.
"Working with outside experts, the Company has contained the attack within its network and has notified the appropriate law enforcement authorities of the incident," reads the 8-K filing.
The Play ransomware gang added A10 Networks to its extortion site yesterday, threatening to leak the files it stole during the intrusion on Sunday.
The Play ransomware group has become one of the most active players, known for targeting a Microsoft Exchange flaw to gain remote code execution and infiltrate victim networks.
News URL
Related news
- Tech giant Nidec confirms data breach following ransomware attack (source)
- Henry Schein discloses data breach a year after ransomware attack (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Dutch Police: ‘State actor’ likely behind recent data breach (source)
- Comcast and Truist Bank customers caught up in FBCS data breach (source)
- Internet Archive hacked, data breach impacts 31 million users (source)
- Internet Archive data breach, defacement, and DDoS: Users’ data compromised (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Fidelity Investments says data breach affects over 77,000 people (source)