{"id":8767,"date":"2024-09-09T13:20:20","date_gmt":"2024-09-09T04:20:20","guid":{"rendered":"https:\/\/cyberenso.jp\/?p=8767"},"modified":"2025-01-27T13:27:44","modified_gmt":"2025-01-27T04:27:44","slug":"server-attacked-risk-of-information-leak-system-square","status":"publish","type":"post","link":"https:\/\/cyberenso.jp\/en\/server-attacked-risk-of-information-leak-system-square\/","title":{"rendered":"Server Attacked, Risk of Information Leak | System Square"},"content":{"rendered":"\n<p>On September 9, 2024, System Square disclosed that it had been the target of a cyberattack on August 26, 2024. The attack was confirmed to have damaged several of the company\u2019s servers. The compromised servers contained customer and technical information, which may have been exposed due to the incident.<br>The legitimate project, however, has clarified that there is no connection between its activities and the cyberattack. In an official statement, the project unambiguously renounced any association with the threat actors and strongly condemned the actions of the ransomware operators.<br>\u201cWe do not know the identity of the criminals behind these heinous crimes and are not associated with these groups in any way,\u201d stated the Cicada 3301 organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 9, 2024, System Square disclosed that it had been the target of a cyberattack on August 26, 2024. The attack was confirmed to have damaged several of the company\u2019s servers. The compromised servers contained customer and technical information, which may have been exposed due to the incident.The legitimate project, however, has clarified that there is no connection between<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":8768,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,17,14,1],"tags":[],"class_list":["post-8767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-read_case_studies","category-read_contributors","category-read_special_reports","category-uncategorized"],"acf":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2025\/01\/dark-background-spooky-still-life-skull-generated-by-ai_188544-20402.jpg?fit=1380%2C789&ssl=1","_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8767"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=8767"}],"version-history":[{"count":1,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8767\/revisions"}],"predecessor-version":[{"id":8770,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/posts\/8767\/revisions\/8770"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/8768"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=8767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/categories?post=8767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/tags?post=8767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}