The Sony Group Corporation is a reputable and globally recognized multinational corporation with its headquarters situated in the Minato district of Tokyo, Japan. Formerly known as the Tokyo Telecom Engineering Corporation, Sony Group Corporation has a rich history of innovation and excellence in the technology and entertainment industries.
A group that has never been seen before has said that they were able to break into all of Sony Group Corporation’s computer systems.
The ransomware operators claim Sony breach on the dark web, but Sony hasn’t responded yet on this matter or claims. Since it’s one-sided information from threat actors only, the validity of the data breach is still uncertain.
Here’s what the operators of the RansomedVC announced:-
“We have successfully compromissed [sic] all of Sony systems. We wont ransom them! we will sell the data. due to sony not wanting to pay. DATA IS FOR SALE”
Sony reportedly resisted ransom demands by RansomedVC. While some pay since businesses’ decisions vary but, cybersecurity experts always recommend not paying or fulfilling the ransom demand.
Implementing AI-Powered Email security solutions “Trustifi” can secure your business from today’s most dangerous email threats, such as Email Tracking, Blocking, Modifying, Phishing, Account Take Over, Business Email Compromise, Malware & Ransomware
Sony’s customers will understandably worry about data protection if all of Sony’s systems have been hacked.
However, if the breach is confirmed, Sony joins a growing list of entertainment companies hit by data breaches.
Besides this, the Game companies are prime targets due to valuable IP, and here below, we have mentioned all the notable victims:-
- Ubisoft (2020)
- CD PROJEKT RED
- FIFA 21 source code (2021)
- Bandai Namco (2022)
- Rockstar Games (2022)
RansomedVC, a new ransomware group that emerged in August 2023, outed nine victims on its dark website. Unlike typical ransomware groups, it threatens GDPR (General Data Protection Regulation) violations, but it’s just another money-seeking scheme.
Here below, we have mentioned all the recommendations offered by the cybersecurity researchers:-
- Block common forms of entry.
- Detect intrusions.
- Stop malicious encryption.
- Create offsite, offline backups.
- Don’t get attacked twice.
Managed endpoint solutions enable organizations to scan for threats manage, resolve, and prevent data breaches. Try for Free Today!