Reading Time: < 1 minutes

Panasonic issued a statement regarding their Canadian operations. Panasonic announced in February that it had been the victim of a “targeted cybersecurity assault” that impacted certain of its processes, systems, and networks.

“We took immediate action to address the issue with assistance from cybersecurity experts and our service providers,” Airi Minobe, a Panasonic representative, stated.

This included identifying the scope of impact, containing the malware, cleaning and restoring servers, rebuilding applications and communicating rapidly with affected customers and relevant authorities.”

The Conti ransomware-as-a-service (RaaS) gang has taken credit for the assault, according to VX-Underground, a malware research organization that gathers malware data and samples (RaaS companies often rent out their ransomware infrastructure to others in exchange for a cut of any ransom revenue).

The group says that they have stolen over 2.8 terabytes of data from Panasonic Canada, having previously attacked Fat Face, Shutterfly, and Ireland’s healthcare service. Conti’s leak page, which professes to provide internal information, spreadsheets, and what appear to be papers belonging to Panasonic’s HR and accounting divisions was spotted.

When questioned by TechCrunch, Panasonic stated unequivocally that the event was the consequence of a ransomware assault. The corporation did not specify what data was obtained or how many people have suffered from the breach but did state that the incident solely affected its Canadian operations.

Olympus was the target of a ransomware assault by the BlackMatter organization.

Cyberattacks are nothing new to Panasonic. The corporation confessed in November of a data breach in their systems last year that the network had been “illegally accessed by a third party” and that “certain data on a file server had been read during the breach.” Panasonic confirmed 2 months later that hackers had gained access to sensitive information belonging to job hopefuls and interns.