{"id":6849,"date":"2022-06-28T18:37:07","date_gmt":"2022-06-28T09:37:07","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=6849"},"modified":"2022-07-04T18:41:48","modified_gmt":"2022-07-04T09:41:48","slug":"chip-manufacturing-giant-amd-investigating-claims-of-stolen-data","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/chip-manufacturing-giant-amd-investigating-claims-of-stolen-data\/","title":{"rendered":"Chip manufacturing giant AMD investigating claims of stolen data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6849\" class=\"elementor elementor-6849\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-977c257 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"977c257\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3198e39\" data-id=\"3198e39\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-55f99de elementor-widget elementor-widget-text-editor\" data-id=\"55f99de\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Monday 27th of June 2022, the RansomHouse extortion group added AMD to their list of victims on their darknet site where they claimed to have stolen more than 450 GB in the January attack. There were some rumours earlier this year that AMD was hit by ransomware, but they were never confirmed officially confirmed.<\/p><p>Based on an examined sample of the allegedly stolen data, AMD passwords, system information and other network files have been found. The extortion group further provide details on their site that employees of the AMD had used weak passwords, which even included the use of \u201cpassword\u201d for some sensitive accounts.\u00a0<\/p><p>A spokesperson from AMD has stated that they are now investigating claims from the RansomHouse extortion group.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Monday 27th of June 2022, the RansomHouse extortion group added AMD to their list of victims on their darknet site where they claimed to have stolen more than 450 GB in the January attack. There were some rumours earlier this year that AMD was hit by ransomware, but they were never confirmed officially confirmed. Based on an examined sample<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":6854,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,12,2,1],"tags":[],"class_list":["post-6849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_vulnerabilities","category-read_article","category-ce_news","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/07\/cyensoamd.jpg?fit=1379%2C919&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6849"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=6849"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6849\/revisions"}],"predecessor-version":[{"id":6857,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/6849\/revisions\/6857"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/6854"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=6849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=6849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=6849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}