{"id":8211,"date":"2023-03-17T19:07:29","date_gmt":"2023-03-17T10:07:29","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8211"},"modified":"2023-04-18T19:19:24","modified_gmt":"2023-04-18T10:19:24","slug":"hitachi-energy-confirms-data-breach-after-cl0ps-wave-of-goanywhere-attacks","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/hitachi-energy-confirms-data-breach-after-cl0ps-wave-of-goanywhere-attacks\/","title":{"rendered":"Hitachi Energy confirms data breach after CL0P\u2019s wave of GoAnywhere attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8211\" class=\"elementor elementor-8211\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-14b8cf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14b8cf2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bf5d36e\" data-id=\"bf5d36e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d102b6 elementor-widget elementor-widget-text-editor\" data-id=\"3d102b6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On Friday 17th of March 2023, Hitachi Energy, a department of Japanese engineering and technology giant Hitachi confirmed it suffered a data breach after the Clop ransomware gang stole data using a zero-day vulnerability (CVE-2023-0669) in the Fortra GoAnywhere MFT (Managed File Transfer), that was first disclosed on February 2023.<\/p><p>&#8220;We recently learned that a third-party software provider called FORTRA GoAnywhere MFT (Managed File Transfer) was the victim of an attack by the CLOP ransomware group that could have resulted in an unauthorized access to employee data in some countries,&#8221; Hitachi press statement.<\/p><p>Hitachi Energy confirmed that they had responded to the incident immediately, disconnected the impacted systems, and initiated an internal investigation to determine the impact. They also stated that all affected employees, applicable data protection authorities, and law enforcement agencies have been informed of the security incident directly.<\/p><p>Hitachi Energy date, we have no information that neither our network operations nor the security or reliability of customer data have been compromised,&#8221; assures the firm&#8217;s statement.<\/p><p>Furthermore, Hitachi Energy revealed that their current investigation has not found any evidence that either their network operations or the security or reliability of customer data have been compromised.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On Friday 17th of March 2023, Hitachi Energy, a department of Japanese engineering and technology giant Hitachi confirmed it suffered a data breach after the Clop ransomware gang stole data using a zero-day vulnerability (CVE-2023-0669) in the Fortra GoAnywhere MFT (Managed File Transfer), that was first disclosed on February 2023. &#8220;We recently learned that a third-party software provider called FORTRA<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,221,2,7,1],"tags":[],"class_list":["post-8211","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-latest_news","category-national-infrastructure","category-ce_news","category-by_country","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/04\/Picture1-4.jpg?fit=1378%2C919&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8211"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8211"}],"version-history":[{"count":7,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8211\/revisions"}],"predecessor-version":[{"id":8224,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8211\/revisions\/8224"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8216"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}