{"id":8349,"date":"2023-05-05T14:13:18","date_gmt":"2023-05-05T05:13:18","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8349"},"modified":"2023-05-30T14:17:05","modified_gmt":"2023-05-30T05:17:05","slug":"ransomware-attack-against-constellation-software-claimed-by-alphv-ransomware-gang","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/ransomware-attack-against-constellation-software-claimed-by-alphv-ransomware-gang\/","title":{"rendered":"Ransomware attack against Constellation Software claimed by ALPHV ransomware gang"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8349\" class=\"elementor elementor-8349\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9aa590c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9aa590c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1003698\" data-id=\"1003698\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37c9ace elementor-widget elementor-widget-text-editor\" data-id=\"37c9ace\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>On the 4<sup>th<\/sup> of May 2023, Constellation Software confirmed that some of its systems were breached by threat actors who also stole personal information and business data. However, they added that the incident did not impact the independent IT systems of Constellation Software&#8217;s operating groups and businesses.<\/p><p>Constellation Software has stated that it had contained the incident and has now restored all of the IT infrastructure systems impacted in the incident. Additionally, business partners and individuals whose information was stolen during the breach are being informed about the attack.<\/p><p>Whilst Constellation Software is yet to reveal who was behind the attack or how the threat actors gained access to its network, the ALPHV ransomware gang have added them to its data leak site where they claimed to have breached the company&#8217;s network and stole more than 1 TB worth of files.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>On the 4th of May 2023, Constellation Software confirmed that some of its systems were breached by threat actors who also stole personal information and business data. However, they added that the incident did not impact the independent IT systems of Constellation Software&#8217;s operating groups and businesses. Constellation Software has stated that it had contained the incident and has now<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[225,6,12,9,2,8,1],"tags":[],"class_list":["post-8349","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-heavy-industry","category-latest_news","category-read_article","category-ransomware_criminals","category-ce_news","category-industry_sector","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2023\/05\/Picture1-5.jpg?fit=1377%2C918&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8349"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8349"}],"version-history":[{"count":6,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8349\/revisions"}],"predecessor-version":[{"id":8357,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8349\/revisions\/8357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8354"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}