Bose admits ransomware attack exposed employee data

Hackers managed to obtain HR data including "compensation-related information" during the March attack

Bose has confirmed that it had experienced a data breach, having fallen victim to a ransomware attack in early March.

The audio equipment manufacturer admitted to the incident in a letter sent to the office of the Attorney General at the New Hampshire Consumer Protection Bureau last week. In the filing, the company's legal representative said that Bose had "experienced a sophisticated cyber-incident that resulted in the deployment of malware/ransomware across [its] environment". The incident is only known to have affected Bose's US systems.

"Immediately upon discovering the attack on March 7, Bose initiated incident response protocols, activated its technical team to contain the incident, and hardened its defenses against unauthorized activity," the letter continued.

In late April, the company's investigation found that hackers managed to obtain HR data "relating to six former New Hampshire employees", including "name, Social Security Number, and compensation-related information".

Although Bose's investigators could not find "evidence to confirm that the data contained in these files was successfully exfiltrated", the company was also "unable to confirm that it was not".

According to Bose's representative, the company has taken steps to further investigate the data breach by cooperating with the FBI as well as employing "experts to monitor the dark web for any indications of leaked data".

Related Resource

X-Force threat intelligence index

Understand the threat landscape with fresh intelligence

X Force threat intelligence indexDownload now

The company has also sought to mitigate the chances of a future cyber attack occurring by enhancing its server and endpoint security, performing "detailed forensics analysis on the impacted server to analyse the impact of the malware/ransomware", and "enhanced monitoring and logging to identify any future actions by the threat actor or similar types of attacks".

It also confirmed that the malicious files used during the attack, as well as "newly identified malicious sites and IPs linked to this threat actor", had been blocked.

Bose Media Relations Director Joanne Berthiaume told IT Pro that the company had not made "any ransom payment".

The identity of the hackers is not known, but the incident follows in the footsteps of several other recent high-profile ransomware attacks that targeted Colonial Pipeline, as well as the Irish and New Zealand health services.

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

Ransomware criminals look to other hackers to provide them with network access
ransomware

Ransomware criminals look to other hackers to provide them with network access

17 Jun 2021
Four in five ransomware victims suffer repeat attacks
ransomware

Four in five ransomware victims suffer repeat attacks

16 Jun 2021
FBI still frowns on ransomware payments
ransomware

FBI still frowns on ransomware payments

11 Jun 2021
New ransomware targets unpatched Microsoft Exchange servers
ransomware

New ransomware targets unpatched Microsoft Exchange servers

1 Jun 2021

Most Popular

Q&A: Enabling transformation
Sponsored

Q&A: Enabling transformation

10 Jun 2021
OnePlus 9 Pro review: An instant cult classic
Hardware

OnePlus 9 Pro review: An instant cult classic

7 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021