• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Technologous - Managed IT Solutions Bryan/College Station

  • Home
  • About
    • Areas We Serve
    • Our Leadership
      • Chris Dawson
      • Ian Soares
  • IT Services
    • Managed IT
    • Support IT
    • Cloud IT
  • Blog
  • Request a Consultation
  • Contact
You are here: Home / Uncategorized / Capcom Victim of Ransomware Attack

Capcom Victim of Ransomware Attack

Capcom Falls Victim to Ransomware Attack

Capcom Victim of Ransomware Attack. Capcom, a Japanese development company with offices in Japan, the US, and Canada that designed Resident Evil, Devil May Cry, Mega Man, Monster Hunter, or Street Fighter. All of these games are victims of a ransomware attack.

Unfortunately, according to a recent disclosure, Capcom is the latest company to fall victim to a nasty ransomware attack.

Capcom’s disclosure reads in part as follows:

“Beginning in the early morning hours of November 2, 2020, some of the Capcom Group networks experienced issues that affected access to certain systems, including email and file servers. The company confirmed that this was due to unauthorized access carried out by a third party and that it has halted some operations of its internal networks as of November 2.”

Capcom revealed the Ragnar Locker attack exfiltrated more than a terabyte worth of sensitive and proprietary information. Worse, Ragnar Locker is demanding a staggering eleven million dollar ransom payment in Bitcoin.

The ransom note included a link to a password-protected web page containing a 24MB sample archive displaying a small fraction of the data hacked from the ransomware attack. The data consists of revenue forecasts, salary spreadsheets, NDAs, immigration forms, corporate communications, royalty reports, and more.

There is no indication as to if or how Capcom plans to respond to the ransom demand from the attack. Unfortunately, these hackers are notorious for promising to delete all stolen data once the ransom has been paid and then putting the information up for sale on the Dark Web anyway, which puts Capcom in a tricky position indeed.

In any event, there’s nothing for you to do about Capcom’s ransomware attack. The stolen information does not appear to include customer payment card information. However, if you’ve made purchases on the company’s website, it pays to keep a close watch on the payment card you used, out of an abundance of caution.

November 11, 2020 Filed Under: Uncategorized Tagged With: Capcom, Ragnar Locker, Street Fighter

Primary Sidebar

GET OUR BLOG IN YOUR EMAIL!

Archives

  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • August 2018

Tags

adobe android App Apple attack Attacks Breach Browser Chrome Credit Card Dark Web Data Database Data Breach Email Facebook Firefox gmail Google Google Chrome government hacker Hackers information Intel iOS iPhone malware Microsoft Microsoft Windows 10 office 365 pandemic Password Passwords patch Phishing ransomeware Ransomware security Social Media Update Vulnerability Wifi Windows Windows 10

Footer

Contact Us

Address: 3091 University Drive, Unit 210, Bryan, Texas 77802
Phone: 979-217-1226

Our Blog

  • Rise In PC Hardware Sales Blamed on Pandemic February 26, 2021
  • DuckDuckGo Search Engine Sees Huge Growth January 28, 2021
  • Malware Is Android’s Worst Nightmare January 27, 2021
  • Ubiquiti Customer Data Breach January 25, 2021
  • Malware Targets Macs And Is Hard To Detect January 23, 2021

Search

Follow Us

  • Facebook
  • Home
  • About
  • Resources
  • Contact
  • Our Leadership
  • Why Choose Us?
  • IT Services
  • Request a Consultation

Copyright © 2021| All Rights Reserved | Powered By Technologous, LLC | Log in