fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Leading US Video Delivery Provider Confirms Ransomware Attack

Leading US Video Delivery Provider Confirms Ransomware Attack

SeaChange International, a US-based leading supplier of video delivery software solutions, has confirmed a ransomware attack that disrupted its operations during the first quarter of 2020.

The company is traded on NASDAQ as SEAC and it has locations in Poland and Brazil. Its customer list includes telecommunications companies and satellite operators such as the BBC, Cox, Verizon, AT&T, Vodafone, Direct TV, Liberty Global, and Dish Network Corporation.

SeaChange also says that its Framework Video Delivery Platform currently powers hundreds of on-premise and cloud live TV and video on demand (VOD) platforms with more than 50 million subscribers in over 50 countries.

April ransomware attack now confirmed

BleepingComputer learned of the attack on SeaChange’s servers during April 2020 when a ransomware gang posted screenshots of files they claimed to have stolen from the company’s servers.

Among those screenshots, we found a cover letter with a Pentagon video-on-demand service proposal.

When BleepingComputer reached out to the US Department of Defense (DoD) to ask if they were aware of a SeaChange breach, the DoD declined to comment saying that it doesn’t share info on potential network intrusions or related investigations.

“In accordance with policy, we will have no information to provide on possible network intrusions or investigations into possible network intrusions in either DOD or contractor networks,” Department of Defense spokesman Lt. Col. Robert Carver told BleepingComputer.

BleepingComputer also reached out to SeaChange multiple times to find if they were aware of the ransomware group’s claims but our emails went unanswered.

However, today, SeaChange finally confirmed the ransomware attack in a 10-Q quarterly report filed with the US Securities and Exchange Commission (SEC).

“In the first quarter of fiscal 2021 [sic], we experienced a ransomware attack on our information technology system,” the company reported.

“While such attack did not have a material adverse effect on our business operation, it caused a temporary disruption. A forensic investigation is being conducted to determine if any data was compromised.”

Also read: What Is A Governance Framework? The Importance And How It Works

Attack claimed by the REvil ransomware gang

As BleepingComputer previously reported, the SeaChange ransomware attack acknowledged by the company today was claimed at the time by the REvil (aka Sodinokibi) ransomware group.

They created a new victim page for SeaChange, which was used to publish snapshots of documents the REvil operators said were during the attack.

REvil is a ransomware-as-a-service (RaaS) operation known for breaching corporate networks using exposed remote desktop services, exploitsspam, as well as via hacked Managed Service Providers.

Although details regarding the attack on SeaChange are scarce, cyber threat intelligence firm Bad Packets discovered that the company was using a Pulse Secure VPN server unpatched against the CVE-2019-11510 vulnerability before it got hit by ransomware.

After gaining access to a targeted enterprise’s network, REvil’s operators spread laterally while stealing sensitive data from servers and workstations to be used as leverage to convince the victim to pay the ransom under the threat of publicly leaking all the stolen info.

They later encrypting all the devices on the company’s compromised network after gaining administrative access to a domain controller.

Brown-Forman is one of REvil’s latest victims, a company that owns the world-known Jack Daniel’s whiskey and Finlandia vodka brands.

Also read: Data Centre Regulations Singapore: Does It Help To Progress?

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us