Nokia subsidiary reveals data breach following Conti ransomware raid

Nokia
Image: IDGNS

SAC Wireless notifies current and former employees that their personal information may be at risk

Print

PrintPrint
Pro

Read More:

24 August 2021 | 0

A Chicago-based subsidiary of Nokia has admitted to a data breach after it was the victim of a ransomware attack that left systems encrypted and data stolen.

According to a letter sent out to current and former employees, SAC Wireless disclosed that an unauthorised third party accessed its systems as part of a ransomware attack on16 June. It said the threat actor was the Conti cyber crime gang and had gained access to the SAC systems, uploaded files to its cloud storage, and then deployed ransomware to encrypt the files on its systems.

Following a forensic investigation with help from external cyber security experts, SAC Wireless found the affected files could contain employees’ details, such as date of birth and contact information such as home addresses, e-mails, phone numbers, and government ID numbers, such as a driver’s license, passport, or military ID, social security numbers. Dependents or beneficiaries of employees may also be affected in the breach.

 

advertisement



 

SAC Wireless said it would continue to work with forensic experts to remedy this incident and to identify potential enhancements to its information security systems.

“In response to this ransomware attack, we have already changed firewall rules, disconnected VPN connections, activated conditional access geo-location policies to limit non-US access, provided additional employee training, deployed additional network and endpoint monitoring tools, expanded multi-factor authentication, and deployed additional threat-hunting and endpoint detection and response tools,” SAC Wireless said in the letter.

The company has also brought in Experian to offer employees a free 24-month membership to their identity protection services.

Sam Curry, chief security officer of Cybereason, told ITPro that while SAC may not be a household name, Nokia is, and threat actors follow the money to the biggest bank vaults and companies.

“They have a lot of experience in knowing who pays. While nothing is 100 percent preventable, ransomware attacks can be managed and most often stopped. In the case of data breaches, organizations need deeper insight into potentially malicious activity in their environments and around the closed threat monitoring is most critical,” he said.

Curry added that organizations should have the right practices in place technically, like closing vulnerabilities, identity hygiene, strong general policies, back and recovery practices, and so on. They should also have an EDR, MDR, or XDR strategy.

“Ransomware is spread using the old APT toolkit – the operations that penetrate networks and plant ransomware like explosives can be hamstrung and stopped as they spread,” he added.

© Dennis Publishing


Professional Development for IT professionals

The mission of the Irish Computer Society is to advance, promote and represent the interests of ICT professionals in Ireland. Membership of the ICS typically reduces courses by 20%. Find out more


Read More:



Comments are closed.

Back to Top ↑