{"id":7657,"date":"2022-10-25T18:38:35","date_gmt":"2022-10-25T09:38:35","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7657"},"modified":"2022-11-21T18:47:59","modified_gmt":"2022-11-21T09:47:59","slug":"hive-ransomware-group-starts-to-leak-data-from-a-ransomware-attack-on-tata-power","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/hive-ransomware-group-starts-to-leak-data-from-a-ransomware-attack-on-tata-power\/","title":{"rendered":"Hive ransomware group starts to leak data from a ransomware attack on Tata Power"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7657\" class=\"elementor elementor-7657\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-88aaad3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88aaad3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c9e711d\" data-id=\"c9e711d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8e563d elementor-widget elementor-widget-text-editor\" data-id=\"e8e563d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Tuesday 25th of October 2022, the Hive ransomware group claimed responsibility for a cyber attack that was disclosed on Friday 14th of October 2022 by a subsidiary of the multinational conglomerate Tata Group, Tata Power. They stated that they encrypted Tata Power&#8217;s data on Monday 3rd of October 2022.<\/p><p>It is believed that the ransom negotiations failed as Hive ransomware operators have posted data they claim to have stolen from Tata Power. Based on the screenshots of the stolen data, it appears that the data include Tata Power employees&#8217; personally identifiable information, National ID card numbers, PAN numbers, salary information, etc. Additionally, the data dump contains engineering drawings, financial and banking records as well as client information.<\/p><p>Tata Power has claimed they have taken steps to retrieve and restore the systems and that all critical operational systems are functioning.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Tuesday 25th of October 2022, the Hive ransomware group claimed responsibility for a cyber attack that was disclosed on Friday 14th of October 2022 by a subsidiary of the multinational conglomerate Tata Group, Tata Power. They stated that they encrypted Tata Power&#8217;s data on Monday 3rd of October 2022. It is believed that the ransom negotiations failed as Hive<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7662,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,12,2,8,1],"tags":[],"class_list":["post-7657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-read_article","category-ce_news","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2022\/11\/Picture1-15.jpg?fit=1375%2C917&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7657"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7657"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7657\/revisions"}],"predecessor-version":[{"id":7665,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7657\/revisions\/7665"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7662"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}