Se informa que Kia sufre un ataque de ransomware con una demanda de 20 millones de dólares Si Kia no paga, los piratas informáticos darán a conocer los datos robados al público. ACTUALIZACIÓN: Un aviso anónimo alega que los técnicos del concesionario Hyundai no pueden acceder a parte del sistema para usar equipos de diagnóstico. Este ha sido el caso presuntamente desde el sábado, según la persona que se puso en contacto con nosotros. Hemos contactado a Hyundai y Kia con estos nuevos detalles para su confirmación. Un grupo de piratas informáticos atacó Kia Motors America y sometió al fabricante de automóviles a un ransomware que supuestamente cerró servicios vitales como sus aplicaciones UVO Link, el sistema de pago y los sitios que usan los distribuidores, según Bleeping Computer . Los piratas informáticos solicitan 404.5833 bitcoins para descifrar los datos y, a los valores actuales, esto equivale a 20.899.559,53 dólares. Si Kia no paga lo suficientemente rápido, entonces el rescate aumenta a 600 bitcoins ($ 30.994.200). Bleeping Computer también obtuvo la supuesta nota de rescate que los piratas informáticos enviaron a Kia. La carta dice que si Kia no intenta contactar a los atacantes dentro de los tres días, una parte de los datos obtenidos se hará pública. Las demandas no dicen específicamente qué tipo de datos robó este hack. En una declaración a Bleeping Computer el 17 de febrero, el fabricante de automóviles negó que estuviera sujeto a ransomware. "También somos conscientes de las especulaciones en línea de que Kia está sujeto a un ataque de 'ransomware'. En este momento, podemos confirmar que no tenemos evidencia de que Kia o cualquier dato de Kia esté sujeto a un ataque de 'ransomware'", dice el anuncio. . Algo extraño es que la carta se dirige a Hyundai Motor America, que está estrechamente relacionada con Kia. En este momento, no parece que Hyundai se vea afectado por el ataque, pero Motor1.com se está comunicando con el fabricante de automóviles para confirmarlo. A medida que los fabricantes de automóviles utilizan cada vez más la tecnología en red, los ataques de piratería y ransomware se convierten en un mayor riesgo de interrumpir su negocio. Por ejemplo, el ransomware en 2017 obligó a Renault a detener temporalmente la producción en Francia , y Nissan tuvo que hacer lo mismo en el Reino Unido en ese momento
https://www.bleepingcomputer.com/ne...-suffers-ransomware-attack-20-million-ransom/ Kia Motors America suffers ransomware attack, $20 million ransom By Lawrence Abrams February 17, 2021 Story updated with Kia Motors America statement below. Kia Motors America has suffered a ransomware attack by the DoppelPaymer gang, demanding $20 million for a decryptor and not to leak stolen data. Kia Motors America (KMA) is headquartered in Irvine, California, and is a Kia Motors Corporation subsidiary. KMA has nearly 800 dealers in the USA with cars and SUVs manufactured out of West Point, Georgia. Yesterday, we reported that Kia Motors America was suffering a nationwide IT outage that has affected their mobile UVO Link apps, phone services, payment systems, owner's portal, and internal sites used by dealerships. When visiting their sites, users are met with a message stating that Kia is "experiencing an IT service outage that has impacted some internal networks," as shown below. A Kia owner tweeted that when they attempted to pick up their new car, a dealership told them that the servers were down due to a ransomware attack. When we contacted Kia Motors America yesterday about these outages and ransomware reports, KMA told us that they were working on resolving the outage. "KMA is aware of IT outages involving internal, dealer and customer-facing systems, including UVO. We apologize for any inconvenience to our customers and are working to resolve the issue and restore normal business operations as quickly as possible." - Kia Motors America. If you have first-hand information about this or other unreported cyberattacks, you can confidentially contact us on Signal at +16469613731 or on Wire at @lawrenceabrams-bc. Kia was attacked by the DoppelPaymer ransomware Today, BleepingComputer obtained a ransom note that we were told was created during an alleged Kia Motors America cyberattack by the DoppelPaymer ransomware gang. In a ransom note seen by BleepingComputer, the attackers state that they attacked Hyundai Motor America, Kia's parent company. Hyundai does not appear to be affected by this attack. Kia Motors America ransom note Source: BleepingComputer The ransom note contains a link to a private victim page on the DoppelPaymer Tor payment site that once again states the target is 'Hyundai Motor America.' The Tor victim page says that a "huge amount" of data was stolen, or exfiltrated, from Kia Motors America and that it will be released in 2-3 weeks if the company does not negotiate with the threat actors. DoppelPaymer is known for stealing unencrypted files before encrypting devices and then posting portions on their data leak site to further pressure victims into paying. Tor payment page for the Kia ransomware attack Source: BleepingComputer To prevent the leak of the data and receive a decryptor, DoppelPaymer is demanding 404 bitcoins worth approximately $20 million. If a ransom is not paid within a specific time frame, the amount increases to 600 bitcoins, or $30 million. 404 bitcoin ransom demand Source: BleepingComputer The DoppelPaymer operation has not indicated what type of data has been stolen. Based on the amount of Kia services suffering an outage, we can expect a wide range of affected servers. The stealing of unencrypted files has become a widely used tactic by ransomware operations to coerce victims to pay, with Emsisoft stating it has affected more than 1,300 companies globally. "Globally, more than 1,300 companies, many US-based, lost data including intellectual property and other sensitive information. Note, this is simply the number of companies which had data published on leak sites and takes no account of the companies which paid to prevent publication," states Emsisoft's 2020 State of Ransomware report. Other well-known victims attacked by DoppelPaymer in the past include Foxconn, Compal, PEMEX (Petróleos Mexicanos), the City of Torrance in California, Newcastle University, Hall County in Georgia, Banijay Group SAS, and Bretagne Télécom. Update 2/17/21: In a statement to BleepingComputer, Kia Motors America has stated that they have seen no evidence that they have suffered a "ransomware" attack. Kia Motors America, Inc. (“Kia”) is currently experiencing an extended systems outage. Affected systems include the Kia Owners Portal, UVO Mobile Apps, and the Consumer Affairs Web portal. We apologize for any inconvenience to affected customers, and are working to resolve the issue as quickly as possible with minimal interruption to our business. We are also aware of online speculation that Kia is subject to a “ransomware” attack. At this time, we can confirm that we have no evidence that Kia or any Kia data is subject to a “ransomware” attack. We have once again reached out and asked if they were impacted by a "cyberattack" but have not heard back. Hyundai also experienced outages After the publishing of this story, numerous Hyundai and dealership employees contacted BleepingComputer to state that Hyundai was also affected by unexplained outages. In emails sent by Hyundai Motors America to Kia dealerships on Saturday and seen by BleepingComputer, Hyundai stated that multiple systems were down including their internal dealer site, hyundaidealer.com. BleepingComputer was also told that services used by dealer technicians were affected as well. Since then, some of these services have since been restored. In a similarly worded statement as Kia, Hyundai told BleepingComputer that they have no evidence of a "ransomware" attack. "At this time, we can confirm that we have no evidence of Hyundai Motor America’s involvement in a “ransomware” attack." - Hyundai Motors America BleepingComputer reached out to confirm if they were impacted by a cyberattack but has not heard back. This is a developing story.
Mi vecino que entiende de geopolítica y seguridad, no iba mal encaminado. Hoy te limpian la cuenta una mafia organizada que opera desde el Congo y le vas a cantar a gardel.
Hace poco paso en el ayuntamiento de donde vivo no se como habrán salido donde esté la cuartilla y el lápiz... https://www.google.es/amp/s/amp.ant...lizados_202010145f86fb12d9123d0001f9dfb7.html
Da igual lo que roben, la competencia no podrá usar esos datos porque si los usa, la que sale beneficiada es Kia. Lo único que les queda es formatear y reinstalar, y que tengan un buen sistema de copa de seguridad fuera de línea.
Normalmente este tipo de empresas suelen tener copias de seguridad de todo en dos zonas diferentes del mundo
Ufff. A mi hijo le hicieron lo mismo en su empresa.. eso sí, le salió más barato, y tenian todo guardado y resguardado y en varios sitios, y tal y tal y tal, perooo. .... palasaca!
yo lo que no entiendo, es como consiguen meterse dentro. Un topo? Un incauto trabajador bajando y ejecutando algo que no debería? Yo con las copias de seguridad soy un p*to paranoico. Siempre fuera de línea y en dispositivos distintos. A la que entrara un ransomware, tiraba del cable de alimentación y montaba el disco duro en un ordenador forense xd.
Es una lacra actual y que plantea la duda de no saber cómo reaccionar al desconocer la "caballerosidad" del trato con esos piratas. Algunos han pagado y solo les han "devuelto " una parte de los datos/sistemas, y te chantajean por el resto. O directamente, desaparecen ....con todo. Y si te pones chulo, pues te arriesgas a perder todo o casi todo. Ya hay suficientes retos actualmente como para añadir estos HDP... Otra opción, fichar a los hackers para proteger tu sistema.
el día que será gordo será cuando los empecinados consigan eliminar el dinero en metálico y vaya todo en digital. A la que se empiecen a secuestrar tpvs, cajeros automáticos, bancos, e incluso todo el sistema de pago, verás que risas al no poder ni pagar el pan en la tienda de al lado.
Tengo pronto revisión de los 2 años o 30000kms, va a ser por los 24 meses, espero que cuando me descarguen la actualización del navegador no venga con bicho