BlackCat ransomware gang claims credit for Seiko data breach

Graham Cluley
Graham Cluley
@
@[email protected]
@gcluley

BlackCat ransomware gang claims credit for Seiko data breach

The BlackCat ransomware gang has claimed credit for a cybersecurity attack against Japanese watchmaker Seiko.

BlackCat (also known as ALPHAV) posted on its dark web leak site what it claims are files stolen from Seiko’s servers.

BlackCat announces Seiko data leak

Like other ransomware operations, BlackCat extorts money from targeted organisations by stealing sensitive data, threatening to release it publicly, and encrypting computer systems to lock victims out of their information.

BlackCat affiliates have often gone one stage further and threatened to launch distributed denial-of-service (DDoS) attacks if extortion demands are not met.

Blackcat ransom note

Seiko announced earlier this month that it had suffered a data breach which saw hackers access “at least one of its servers” and warned that information may have been stolen.

Sign up to our free newsletter.
Security news, advice, and tips.

The company says that it has brought in external experts to investigate the incident.

Earlier this year, cybersecurity reporter Brian Krebs published an interesting account of his contact with online criminals who may be associated with the Russian-speaking BlackCat group.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "Smashing Security" podcast. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.