[ad_1]

A10 network panel

California-based networking hardware manufacturer “A10 Networks” confirmed to BleepingComputer that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data.

A10 Networks specializes in manufacturing software and hardware application delivery controllers (ADCs), identity management solutions, and bandwidth management appliances, while also offering intelligence and mitigation services. firewalls and DDoS threats.

Its clients include Twitter, LinkedIn, Samsung, Uber, NTT Communications, Sony Pictures, Windows Azure, Xbox, Yahoo, Alibaba, China Mobile, Comcast, Deutsche Telekom, Softbank, GE Healthcare, GoDaddy and Huffington Post.

In an 8-K filing submitted earlier this week, the company says the security incident occurred on January 23, 2023 and lasted a few hours before its IT team was able to stop the intrusion and contain the threats. damage.

The company’s investigation determined that the threat actors managed to gain access to shared drives, deploy malware, and “compromised” data related to human resources, finance, and legal functions.

Despite the successful network intrusion, the company says the security incident had no impact on its products or solutions and cannot have affected its customers.

“Working with outside experts, the company contained the attack within its network and notified the incident to law enforcement authorities,” the statement read. 8-K rating.

“The company does not currently expect this incident to have a material impact on its operations.”

Yesterday, the Play ransomware gang added A10 Networks to its extortion site, threatening to release the files it stole during Sunday’s intrusion.

A10 networks listed on the Play Tor site
A10 networks listed on Play ransomware’s Tor site (Computer Beep)

Threat actors claim to possess confidential files, including technical documentation, employee and customer documents, agreements and personal data.

The Play ransomware group has become one of the most active players, known to target a Microsoft Exchange flaw to achieve Remote Code Execution (RCE) and infiltrate victim networks.

The gang recently compromised the Belgian town of AntwerpTHE H-Hotels Central European hotel chain Arnold Clark car retailer and cloud service provider rack space.

[ad_2]

Source link