ALPHV claims to have hacked camera manufacturer Ring

B2B Cyber ​​Security ShortNews

Share post

In addition to many private users, the provider Ring also supplies small companies with cameras, surveillance systems and video doorbells. Now the Amazon subsidiary Ring can be found as a victim on the ALPHV or BlackCat leak page. 

As soon as the APT group ALPHV or BlackCat has hacked a company, it is publicly exposed on its leak page. Normally, it always says when and how much data was stolen. Because the goal of the group is always multiple blackmail. First the company is hacked and then the data is encrypted using ransomware. Before that, however, the group still transports a lot of data and puts it on its leak page for a while while it is still protected. If the victim does not pay the ransom, ALPHV publishes the data on the Internet.

Ring is listed on the leak page

🔎 According to the APT group ALPHV / BlackCat, the Amazon subsidiary Ring is said to have been hacked (Image: B2B-CS).

Ring is currently listed as a victim on the leak page, but there is no further information about the hack and no information on the amount of data stolen. Maybe that will be handed in later. According to various online media, Ring should have no evidence of an attack on its own systems. However, ransomware could have hit a third-party provider that is managing data or a service for Ring.


More at


Matching articles on the topic

Cyber ​​danger Raspberry Robin

A leading provider of an AI-powered, cloud-delivered cybersecurity platform warns about Raspberry Robin. The malware was first released in the year ➡ Read more

New scam Deep Fake Boss

Unlike classic scams such as the email-based boss scam, the Deep Fake Boss method uses high-tech manipulation ➡ Read more

Classification of the LockBit breakup

European and American law enforcement authorities have managed to arrest two members of the notorious LockBit group. This important strike against the ransomware group ➡ Read more

The Bumblebee malware is back

The Bumblebee malware is being used again by cybercriminals after an absence of several months. IT security experts were recently able to identify an email campaign that used the brand ➡ Read more

Microsoft Defender can be tricked

Microsoft's antivirus program Defender contains a component that is intended to detect and prevent the execution of malicious code using Rundll32.exe. This ➡ Read more

Ransomware attack on IT service providers

A data center owned by the Finnish IT service provider Tietoevry located in Sweden was recently attacked with ransomware. Numerous companies, authorities and universities are ➡ Read more

Threat potential from state actors

The extent of the current threat situation is illustrated by a cyber attack that recently occurred in Ukraine. According to the state ➡ Read more

Critical vulnerabilities at Fortinet

The Federal Office for Information Security (BSI) warns of a security gap in several versions of the Fortinet operating system FortiOS, for example ➡ Read more