The US hardware giant gave us an update on the extent of the damage done in the recent cyberattack.
Calling the attack a “network security incident”, the San Jose, California based maker of hard drives and other data storage systems sought to portray itself as in control of the situation. “On March 26, 2023, we identified a network security incident where an unauthorized third party gained access to a number of the Company’s systems”, the statement begins.
“On April 2, 2023, we disclosed that upon discovery of this incident, we implemented incident response efforts and initiated an investigation with the assistance of leading security industry experts”, WDC continues. “This investigation is underway and includes analysis to understand the nature and scope of data obtained by the unauthorized party”.
Online customers targeted
WDC goes on to explain that “an unauthorized party” obtained a copy of a Western Digital database used for the company’s online store. The data trove, they explain, “contained some personal information of our online store customers”.
Specifically, the cyber attackers got away with customer names, billing and shipping addresses, email addresses and telephone numbers. In addition, WDC says, the database included hashed and salted passwords and partial credit card numbers – adding that these data sets were in “encrypted format”.
“We will communicate directly with impacted customers”, WDC assures us.
Ransomware play is in progress
Last month TechCrunch reported that the hackers who attacked WDC claimed to have stolen “around 10 terabytes of data” from the company. The article claimed that the cyber bandits were extorting the company to negotiate an 8-figure ransom in exchange for not publishing the stolen data.
Last week’s update did not mention the ransom or the attackers’ threats, but did admit to having WDC customer data appear publicly on thew web. “We are aware that other alleged Western Digital information has been made public’, the company said, adding that they are investigating the validity of the released data and “will continue reporting our findings as appropriate”.