The RansomHouse extortion gang claims to have stolen 450 GB of data from the chipmaker giant AMD in 2021 and threatens to leak it or sell it if the company will not pay the ransom.
The company has been added this week to the gang’s dark web leak site:
According to BleepingComputer, a RansomHouse partners has breached the network of AMD a year ago, but the leak site reports January 5th, 2022, as the date of the compromise.
RansomHouse launched its operation in December 2021, unlike other extortion group, the gang doesn’t encrypt data, but focuses on data theft to speed up its activity.
This means that threat actors did not infect AMD systems, but once obtained access to its networks had stolen internal data.
Allegedly stolen data includes corporate research and financial documents, but at this time the only published a few files containing information from an internal network likely collected during a reconnaissance phase.
One of the files, all_computers.csv, contains a list of over 77,000 machinese hosted on the AMD’s internal network. Another leaked file, sample_passwords.txt, includes a list of weak AMD user credentials, such as ‘password’, ‘P@ssw0rd’, and ‘amd!23.’
AMD is currently investigating the alleged security breach.
At the time of this writing the leak site includes the name of five organizations hit by the group:
Stay tuned …
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, RansomHouse)
[adrotate banner=”5″]
[adrotate banner=”13″]
Over 40,000 internet-exposed security cameras worldwide are vulnerable to remote hacking, posing serious privacy and…
INTERPOL announced that a joint operation code-named Operation Secure took down 20,000+ malicious IPs/domains tied…
A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…
A vulnerability could allow recovery of the phone number associated with a Google account by…
Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…
SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…
This website uses cookies.