Bose admits ransomware attack exposed employee data

Hackers managed to obtain HR data including "compensation-related information" during the March attack

Bose has confirmed that it had experienced a data breach, having fallen victim to a ransomware attack in early March.

The audio equipment manufacturer admitted to the incident in a letter sent to the office of the Attorney General at the New Hampshire Consumer Protection Bureau last week. In the filing, the company's legal representative said that Bose had "experienced a sophisticated cyber-incident that resulted in the deployment of malware/ransomware across [its] environment". The incident is only known to have affected Bose's US systems.

"Immediately upon discovering the attack on March 7, Bose initiated incident response protocols, activated its technical team to contain the incident, and hardened its defenses against unauthorized activity," the letter continued.

In late April, the company's investigation found that hackers managed to obtain HR data "relating to six former New Hampshire employees", including "name, Social Security Number, and compensation-related information".

Although Bose's investigators could not find "evidence to confirm that the data contained in these files was successfully exfiltrated", the company was also "unable to confirm that it was not".

According to Bose's representative, the company has taken steps to further investigate the data breach by cooperating with the FBI as well as employing "experts to monitor the dark web for any indications of leaked data".

Related Resource

X-Force threat intelligence index

Understand the threat landscape with fresh intelligence

X Force threat intelligence indexDownload now

The company has also sought to mitigate the chances of a future cyber attack occurring by enhancing its server and endpoint security, performing "detailed forensics analysis on the impacted server to analyse the impact of the malware/ransomware", and "enhanced monitoring and logging to identify any future actions by the threat actor or similar types of attacks".

It also confirmed that the malicious files used during the attack, as well as "newly identified malicious sites and IPs linked to this threat actor", had been blocked.

Bose Media Relations Director Joanne Berthiaume told IT Pro that the company had not made "any ransom payment".

The identity of the hackers is not known, but the incident follows in the footsteps of several other recent high-profile ransomware attacks that targeted Colonial Pipeline, as well as the Irish and New Zealand health services.

Featured Resources

How to choose an AI vendor

Five key things to look for in an AI vendor

Download now

The UK 2020 Databerg report

Cloud adoption trends in the UK and recommendations for cloud migration

Download now

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world

Download now

The impact of AWS in the UK

How AWS is powering Britain's fastest-growing companies

Download now

Recommended

FBI still frowns on ransomware payments
ransomware

FBI still frowns on ransomware payments

11 Jun 2021
New ransomware targets unpatched Microsoft Exchange servers
ransomware

New ransomware targets unpatched Microsoft Exchange servers

1 Jun 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021
Hackers use open source Microsoft dev platform to deliver trojans
Security

Hackers use open source Microsoft dev platform to deliver trojans

14 May 2021

Most Popular

Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021
Fastly blames software bug for major outage
public cloud

Fastly blames software bug for major outage

9 Jun 2021
GitHub to prohibit code that’s used in active attacks
cyber security

GitHub to prohibit code that’s used in active attacks

7 Jun 2021