The BlackCat/ALPHV ransomware gang has added Seiko to its extortion web site, claiming duty for a cyberattack disclosed by the Japanese agency earlier this month.
Seiko is likely one of the world’s largest and most historic watchmakers, with roughly 12,000 workers and an annual income that surpasses $1.6 billion.
On August tenth, 2023, the corporate printed a discover of an information breach informing that an unauthorized third-party gained entry to a minimum of part of its IT infrastructure and accessed or exfiltrated information.
“It seems that [on July 28, 2023] some as-yet-unidentified occasion or events gained unauthorized entry to a minimum of certainly one of our servers,” reads Seiko’s announcement.
“Subsequently, on August 2nd, we commissioned a group of exterior cybersecurity consultants to research and assess the scenario.”
“Consequently, we at the moment are fairly sure that there was a breach and that some data saved by our Firm and/or our Group corporations could have been compromised.”
Seiko apologized to the doubtless impacted prospects and enterprise companions and urged them to be vigilant in opposition to e-mail or different communication makes an attempt doubtlessly impersonating Seiko.
BlackCat assuming duty
In the present day, the BlackCat ransomware group claimed to be behind the assault on Seiko, posting samples of information that they declare to have stolen throughout the assault.
Within the itemizing, the menace actors mock Seiko’s IT safety and leak what look like manufacturing plans, worker passport scans, new mannequin launch plans, and specialised lab take a look at outcomes.
Most worryingly, the menace actors have leaked samples of what they declare are confidential technical schematics and Seiko watch designs.

Supply: BleepingComputer
This means that BlackCat very possible possesses drawings that showcase Seiko internals, together with patented expertise, which might be damaging to publish and expose to rivals and imitators.
BlackCat is likely one of the most superior and infamous ransomware gangs actively concentrating on the enterprise, consistently evolving its extortion techniques.
For instance, the group was the primary to make use of a clearweb web site devoted to leaking information for a specific sufferer and, extra just lately, created an information leak API, permitting for simpler distribution of stolen information.
BleepingComputer has contacted Seiko for added feedback on the menace actor’s claims, however we’ve not obtained a response by publication time.