{"id":7981,"date":"2023-02-10T22:47:14","date_gmt":"2023-02-10T13:47:14","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=7981"},"modified":"2023-03-01T23:06:09","modified_gmt":"2023-03-01T14:06:09","slug":"a10-networks-confirms-play-ransomware-attack","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/a10-networks-confirms-play-ransomware-attack\/","title":{"rendered":"A10 Networks confirms Play ransomware attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7981\" class=\"elementor elementor-7981\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c2fd80 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9c2fd80\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-81e33eb\" data-id=\"81e33eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87cde1e elementor-widget elementor-widget-text-editor\" data-id=\"87cde1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Earlier this week, A10 Networks, a USA-based networking hardware manufacturer confirmed that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data. A10 Networks stated that the incident occurred on Monday 23rd of January 2023, which lasted for a few hours before its IT team managed to stop the intrusion.<\/p><p>Following an investigation into the incident, it was determined that the threat actors managed to gain access to shared drives, deployed malware, and accessed files related to human resources, finance, and legal functions.<\/p><p>Although the threat actors were able to gain access to their network, the A10 Networks have stated that the security incident has not impacted any of its products or solutions.<\/p><p>On Thursday 9th of February 2023, the Play ransomware gang added A10 Networks to its extortion site where they are threatening to leak the files it stole. The gang claimed to possess confidential files, including technical documentation, employee and client documents, agreements, and personal data.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Earlier this week, A10 Networks, a USA-based networking hardware manufacturer confirmed that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data. A10 Networks stated that the incident occurred on Monday 23rd of January 2023, which lasted for a few hours before its IT team managed to stop the intrusion. Following an investigation into the incident,<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":7986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,10,12,9,2,8,1],"tags":[],"class_list":["post-7981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-latest_vulnerabilities","category-read_article","category-ransomware_criminals","category-ce_news","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/03\/Picture1-2.jpg?fit=1375%2C917&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7981"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=7981"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7981\/revisions"}],"predecessor-version":[{"id":7989,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/7981\/revisions\/7989"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/7986"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=7981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=7981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=7981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}