Kyocera AVX says ransomware attack impacted 39,000 individuals

Kyocera AVX says ransomware attack impacted 39,000 individuals

November 9, 2023 at 05:10PM

Kyocera AVX Components Corporation (KAVX), an American manufacturer of electronic components, experienced a data breach exposing personal information of 39,111 individuals following a ransomware attack. The breach occurred between February 16 and March 30, 2023. The hackers responsible, the LockBit ransomware gang, leaked stolen data that includes full names and Social Security Numbers. KAVX will cover the costs of dark web monitoring and password leak service for impacted individuals. The breach also exposed proprietary designs and patented information.

Key Takeaways from Meeting Notes:

1. Kyocera AVX Components Corporation (KAVX) experienced a data breach exposing personal information of 39,111 individuals due to a ransomware attack.
2. The breach occurred between February 16 and March 30, 2023, and was discovered on October 10, 2023.
3. The breach affected servers located in Greenville and Myrtle Beach, South Carolina, USA, resulting in the encryption of some systems and temporary disruption of certain services.
4. Personal information, including full names and Social Security Numbers (SSNs), was confirmed to be exposed, and additional details may have been compromised.
5. KAVX reassures recipients that there is no evidence of the stolen data being misused but warns about the risk of identity theft and fraud.
6. KAVX will provide impacted individuals with a 12-month dark web monitoring and password leak service at no cost.
7. The LockBit ransomware gang claimed responsibility for the breach and added KAVX to their data leak site.
8. Stolen data samples on the LockBit extortion portal included passport scans, financial documents, non-disclosure agreements, and more.
9. The deadline set for KAVX to pay the ransom was June 9, 2023.
10. The breach also exposed component schematics and technical drawings, potentially compromising proprietary designs and patented information.

Full Article