Skip to content

Pandora ransomware group hacks automotive giant Denso

Denso, a global supplier of automotive parts to clients like Toyota, GM, Honda and Ford, has said that a third party had illegally accessed its German network on Thursday, March 10. The firm has reported the incident to local authorities and is working with “specialised cyber security agencies” to deal with the situation. 

As soon as the breach was detected, Denso cut off the affected devices from the network and confirmed no impact on other firm facilities. The company claims that the rest of the details are currently under investigation, there’s no interruption to production, and the firm will be operating all its plants as usual. 

“DENSO would like to express its sincerest apologies for any concern or inconvenience resulting from this incident. Denso Group will once again strengthen security measures and work to prevent a recurrence”, said the statement from the company published this Monday

In the News: Facebook has a paedophile problem

Ransomware on the Roll

Denso did not give out any information about exactly what happened and whether any data was taken or not. However, as reported by ZDNetthe Pandora ransomware group has claimed responsibility for the attack. The leak site was accessed by ZDNet via Kela’s Darkbeast engine and contained 1.4TB of stolen data.

The site shows off samples of the stolen datasets, including purchase orders, technical component documents and sales files. It’s common for ransomware gangs to leak some stolen information and threaten to release more to pressure the company to pay the ransom.

Denso hasn’t confirmed whether or not the attack was ransomware, let alone that the group has contacted them to set a ransom and deadline yet. 

In the News: YouTube Vanced bites the dust

Hello There!

If you like what you read, please support our publication by sharing it with your friends, family and colleagues. We're an ad-supported publication. So, if you're running an Adblocker, we humbly request you to whitelist us.

We may earn a commission if you buy something from a link on this page. Thanks for your support.







>