LockBit: Huge chip manufacturer probably not a victim after all

B2B Cyber ​​Security ShortNews

Share post

LockBit claims to have hacked the Taiwanese company TSMC and now wants a ransom of 70 million dollars. The group is the third largest chip manufacturer in the world. TSMC replies that only a small supplier was caught.

On the LockBit 3 leak page you can still see the leak that the Taiwanese company TSMC was hacked and data was stolen. The APT group demands a ransom of 70 million dollars for the data or wants to publish it on the Internet. The group is probably demanding the highest ransom that has ever been demanded.

Not TSMC but a hardware supplier

🔎 LockBit is of the opinion that it has captured TSMC data - but it is probably only data from a hardware supplier (Image: B2B-CS).

gegenüber BleepingComputer said a TSMC spokesman. It is not an attack on TSMC systems, but on the systems of Kinmax Technology - one of TSMC's IT hardware suppliers. Kinmax Technology is said to have already reported an incident in which data was probably also stolen. According to TSMC, the provider is responsible for the initial setup and configuration of servers. However, TSMC assures that every hardware component goes through a series of security checks before being installed in TSMC's system.

TSMC has not only confirmed that its systems have not been impacted in any way, but has also stopped working with the affected supplier until the situation is resolved. Finally, the semiconductor company informed the online portal BleepingComputer that the investigation into the cyber security incident is still ongoing and that a law enforcement agency is also involved.

Kinmax Technology reports on the incident

On the website of Kinmax Technology the following is reported: “On the morning of June 29, 2023, the company found that it was attacked by an external group in the company's internal specific test environment and relevant information was retrieved. On the same day we completed the notification and apologized to the customer. At the same time, we invited an external information security team to work with the customer to mitigate the damage.

The attacked environment is the technical test area. This is the system installation environment prepared for customers. The captured content is parameter information such as installation configuration files. The customer’s company name (TSMC) gave the cyber attackers hope that they could use this to obtain sensitive customer information.”

Since Kinmax Technology isn't even remotely the size of TSMC, the request won't be complied with - even if you might have wanted to. There are currently over 30 days left on the countdown timer. On 06 Aug, 2023 09:16:35 UTC should be the moment of truth - at least according to LockBit 3.

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more