Bose admits ransomware attack exposed employee data
Hackers managed to obtain HR data including "compensation-related information" during the March attack
Bose has confirmed that it had experienced a data breach, having fallen victim to a ransomware attack in early March.
The audio equipment manufacturer admitted to the incident in a letter sent to the office of the Attorney General at the New Hampshire Consumer Protection Bureau last week. In the filing, the company's legal representative said that Bose had "experienced a sophisticated cyber-incident that resulted in the deployment of malware/ransomware across [its] environment". The incident is only known to have affected Bose's US systems.
"Immediately upon discovering the attack on March 7, Bose initiated incident response protocols, activated its technical team to contain the incident, and hardened its defenses against unauthorized activity," the letter continued.
In late April, the company's investigation found that hackers managed to obtain HR data "relating to six former New Hampshire employees", including "name, Social Security Number, and compensation-related information".
Although Bose's investigators could not find "evidence to confirm that the data contained in these files was successfully exfiltrated", the company was also "unable to confirm that it was not".
According to Bose's representative, the company has taken steps to further investigate the data breach by cooperating with the FBI as well as employing "experts to monitor the dark web for any indications of leaked data".
The company has also sought to mitigate the chances of a future cyber attack occurring by enhancing its server and endpoint security, performing "detailed forensics analysis on the impacted server to analyse the impact of the malware/ransomware", and "enhanced monitoring and logging to identify any future actions by the threat actor or similar types of attacks".
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
It also confirmed that the malicious files used during the attack, as well as "newly identified malicious sites and IPs linked to this threat actor", had been blocked.
Bose Media Relations Director Joanne Berthiaume told IT Pro that the company had not made "any ransom payment".
The identity of the hackers is not known, but the incident follows in the footsteps of several other recent high-profile ransomware attacks that targeted Colonial Pipeline, as well as the Irish and New Zealand health services.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
Morgan Stanley research warns AI is having a huge impact on jobsNews Analysis of five sectors highlights an "early warning sign" of AI’s impact on jobs
-
AI is “forcing a fundamental shift” in data privacy and governanceNews Organizations are working to define and establish the governance structures they need to manage AI responsibly at scale – and budgets are going up
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen
-
Cybersecurity experts face 20 years in prison following ransomware campaignTwo men used their tech expertise to carry out ALPHV BlackCat ransomware attacks
-
15-year-old revealed as key player in Scattered LAPSUS$ HuntersNews 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement
-
The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to knowNews The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware
-
Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposedNews No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems
-
The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible'News Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world
-
A notorious ransomware group is spreading fake Microsoft Teams ads to snare victimsNews The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities
