India’s largest integrated power company, Tata Power, which has been in business since 1915, has been hit by a ransomware attack staged by the Hive group.
The ransomware only works on Windows systems and the group has now released data it claims came from the attack on the dark web.
The company acknowledged the attack in a note to the National Stock Exchange of India on October 14.
“Tata Power Company Limited has suffered a cyberattack on its IT infrastructure, affecting some of its IT systems,” the letter said.
“The company has taken steps to recover and restore systems. All critical operational systems are functioning; however, as an abundant precaution, restricted access and preventative controls have been put in place for portals and customer touchpoints. employees and customers.
Tata Power faced a cyberattack… pic.twitter.com/zllZvajj2G
— Rohit Srivastwa (rohit11.eth) ?? (@rohit11) October 14, 2022
“The company will provide an update on the matter in the future.”
Hive Group claims to have encrypted data from Tata Power systems on October 3 and posted a link to emails, addresses, passports, phone numbers, payments, working hours, taxpayer information, contracts signed by TATA Power , NDA and other agreement documents on October 24.
According security company Trend Micro, Hive is a relatively new group that surfaced in June 2021. Unlike some ransomware groups that avoid attacking hospitals or other specific sectors, Hive shows no such inclination.
“A hospital in Missouri suffered a Hive ransomware attack three weeks after the same group hit the embedded systems of a health care provider which affected three hospitals and numerous outpatient clinics in two other US states,” Trend Micro said.
iTWire has contacted Tata Power for comment. However, emails sent to the company’s primary media email address are bouncing.
A message in the forwarded email reads: “The Corporate Communications group only accepts messages from people in their organization or on their safe senders list, and your email address is not on the list. .”
However, an email to the company’s PR manager appears to have been forwarded and the email query was sent to two other people listed on his media contact page.
GET READY FOR XCONF AUSTRALIA 2022
Thoughtworks presents XConf Australia, back in person in three cities, bringing together people who care deeply about software and its impact on the world.
Now in its fifth year, XConf is our annual technology event created by technologists for technologists.
Participate in a robust discussion program as local thought leaders and Thoughtworks technologists share first-hand experiences and discuss new ways to empower teams, deliver great software, and drive innovation for technology responsible.
See how we at Thoughtworks are improving technology, together.
Tickets are available now and all proceeds will be donated to Indigitek, a non-profit organization that aims to create tech employment pathways for First Nations people.
Click the button below to register and get your ticket to the Melbourne, Sydney or Brisbane event
GET YOUR TICKET!
PROMOTE YOUR WEBINAR ON ITWIRE
It’s all about webinars.
Marketing budgets are now focused on webinars combined with lead generation.
If you want to promote a webinar, we recommend at least a 3-4 week campaign before your event.
The iTWire campaign will include numerous advertisements on our news site itwire.com and a major newsletter promotion https://itwire.com/itwire-update.html and promotional and editorial news. Plus a video interview of the keynote speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in promotional messages on the iTWire homepage.
Now that we are coming out of Lockdown, iTWire will focus on supporting your webinars and campaigns and support through partial payments and extended terms, Webinar Business Booster pack and other support programs. We can also create your advertisements and written content and coordinate your video interview.
We look forward to discussing your campaign goals with you. Please click the button below.
MORE INFO HERE!