Ransomware group claims to have compromised Amazon’s Ring

Share post:

ALPHV, a ransomware group, claims to have compromised Ring, an Amazon-owned company that manufactures smart doorbells with cameras. According to Vice’s Motherboard, the group has added a new entry to its leak site that features Ring’s logo.

The group hinted in a message that negotiations over the ransom demand are ongoing or may have broken down. The group’s message reads, “There’s always the option to let us leak your data.”

Amazon, on the other hand, stated that it has “no indications” that Ring was the victim of a ransomware attack, but confirmed that a third-party vendor was infected. It went on to say that Ring is currently working with it to learn more about the incident. It also stated that the vendor has no access to customer records.

There have been no reports of what kind of data ALPHV is allegedly holding and threatening to release, and Amazon has instructed its employees to remain silent about the incident. It is still unknown who the third party is, what data is being held, how the group gained access to the target network, and what the ransom demands are.

The full scope of the incident cannot be known until ALPHV leaks the data or Ring files a report with the SEC.

The sources for this piece include an article in Techradar.

SUBSCRIBE NOW

Related articles

Hamilton Estimates $52 Million to Rebuild IT Systems After Ransomware Attack

The city of Hamilton plans to spend $52 million over the next three years to rebuild and secure...

Avery Data Breach: Credit Card Skimmer Affects Over 61,000 Customers

Label maker Avery has disclosed a data breach affecting 61,193 customers, caused by a credit card skimmer that...

Scammed Company Ordered to Pay $190k for Fraudulent Invoice Payment

A hacker gained access to Mobius Group’s email system and sent instructions from a legitimate email address, directing...

Sneaky 2FA: A Sophisticated Attack Defeats Both 2FA and Phishing Protections

A new phishing kit, ominously named "Sneaky 2FA," has emerged, targeting Microsoft 365 users by bypassing two-factor authentication...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways