When asked by TechCrunch, Panasonic did not dispute that the incident was the result of a ransomware attack. TechCrunch has seen Conti’s leak page, which purports to be sharing internal files, spreadsheets and what appears to be documents belonging to Panasonic’s HR and accounting departments. (RaaS groups typically rent out their ransomware infrastructure to others in return for a percentage of any ransom proceeds.) The gang, which has previously targeted Fat Face, Shutterfly and Ireland’s healthcare service, claims to have stolen over 2.8 gigabytes of data from Panasonic Canada. James H, GriffLI and panhandleguy like this. Settings>application manager>all>camera and clear cache and data.
“This included identifying the scope of impact, containing the malware, cleaning and restoring servers, rebuilding applications and communicating rapidly with affected customers and relevant authorities.”Īccording to VX-Underground, a malware research group that collects malware samples and data, the Conti ransomware-as-a-service (RaaS) group has claimed responsibility for the attack. If youve set up your camera with different short cuts etc it will revert to default settings. “We took immediate action to address the issue with assistance from cybersecurity experts and our service providers,” said Panasonic spokesperson Airi Minobe. In a statement provided to TechCrunch, Panasonic said that it was a victim of a “targeted cybersecurity attack” in February that affected some of its systems, processes and networks.
Japanese tech giant Panasonic has confirmed its Canadian operations were hit by a cyberattack, less than six months after the company last fell victim to hackers.