Tech giant Acer was hacked twice in a week, the same threat actor (Desorden) initially breached some of its servers in India, now it is claiming to have also breached some systems in Taiwan.
Last week the company revealed that its after-sales service systems in India were hit by an isolated attack.
The incident was disclosed after threat actors have advertised the sale of more than 60 GB of data on an underground cybercrime forum.
The threat actors now claim to have breached the servers of Acer Taiwan on October 15th and have stolen internal data, including employee and product information.
Desorden compromised Acer for the second time in less than a week to demonstrate that the company is still exposed to cyber attacks to its negligence, he also claims that other servers in Asia of the company are still vulnerable.
In response to the intrusion, Acer Taiwan took down the compromised server.
“We have recently detected an isolated attack on our local after-sales service system in India and a further attack in Taiwan. Upon detection, we immediately initiated our security protocols and conducted a full scan of our systems. We are notifying all potentially affected customers in India, while the attacked Taiwan system does not involve customer data. The incident has been reported to local law enforcement and relevant authorities, and has no material impact to our operations and business continuity.” reads the statement issued by the Tech giant.
This is the third time ACER suffered a security breach, in March the computer giant was hit by REvil ransomware operators that compromised its systems and requested the record $50,000,000 ransom.
While the threat actors claimed to have obtained information on customers, login credentials for retailers and distributors, and corporate and financial documents, the company pointed out only employees’ data was exposed.
Follow me on Twitter: @securityaffairs and Facebook
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, data breach)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.