Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Cyber intrusion hits Yakult Australia and New Zealand

DragonForce releases 95GB of leaked data: Buttonware known for production of popular probiotic beverage

The well-known company Yakult Australia was the victim of a cyber attack. The "DragonForce" criminal group claimed responsibility for the raid, during which 95GB of company data was allegedly stolen and subsequently disclosed. Despite the accident, the company's offices are operational. The investigations are ongoing.
This pill is also available in Italian language

Yakult Australia has confirmed that it has been the victim of a cyber incursion, as reported to BleepingComputer. The attack affected both the Australian and New Zealand IT systems of the company that produces the popular probiotic drink. Following the incident, cybercriminal group DragonForce said it leaked 95 GB of company data. Yakult, introduced in Japan in 1935 and now popular globally, is known for its benefits on digestion and the immune system.

Yakult under attack, investigation underway

In an official communication, David Whatley, director of Yakult Australia, expressed that the company became aware of the incident on the morning of December 15th. It is currently not yet clear how the attack occurred and its extent remains under investigation. Despite the inconvenience, it is confirmed that offices in both countries remain open and functioning. A notice explaining the current situation is now visible on the Yakult Australia website.

DragonForce claims the attack and filters data

The cyber criminal collective calling itself 'DragonForce' claimed responsibility for the attack on Yakult Australia through its website accessible via the Tor network. On December 20, the group threatened to disclose 95.19 GB of data, a promise it later kept. The theft reportedly included company database data, contracts, passports and other confidential information. Preliminary analysis of the leaked material appears to contain documents of a corporate and identifying nature.

DragonForce: an emerging group in the cybercriminal landscape

There is limited information available about 'DragonForce'. The group has so far listed 20 targets on its data leak site, dubbed 'DragonLeaks'. The layout of the site suggests a practice of extortion followed by the public dissemination of the stolen data in the event of non-payment, similar to that adopted by other cybercriminal organisations. There is no confirmation of the group's association with the hacktivist collective DragonForce Malaysia, known for previous attacks against government entities in the Middle East.

Follow us on Twitter for more pills like this

12/27/2023 11:05

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated