Threat Intel Flash: Sisense Data Compromise: ARC Labs Intelligence Flash

Get the Latest


Play Ransomware Claims A10 Networks as Latest Victim

Application delivery controller manufacturer A10 Networks has suffered a data breach according to BetterCyber. Play ransomware, also known as PlayCrypt, is believed to be behind the breach after A10 Networks was listed on their leak site. The group claims to have “private and personal confidential data, a lot of technical documentation, agreements, employee and client documents.” A10 Networks first noticed issues internally on January 23rd, but they claim the issue did not affect any client-facing products or services. “Upon detecting the incident, the company launched an investigation and engaged the services of cybersecurity experts and advisors, incident response professionals and external counsel to support the investigation,” A10 Networks stated in a filing with the Securities and Exchange Commission. Further details have yet to be released, so it is unclear if there is a ransom demand, but the company claims to have had proper security measures in place that allowed them to minimize the scope of the attack. All proper authorities have been made aware of the incident.

Analyst Notes

The full scope of this attack is not yet known, but it is always important to be reminded of some ways to protect against ransomware in the future. Some measures that can be used to reduce the impact or likelihood of an attack include:

• Regularly back up data, air gap, and password-protect backup copies offline.
• Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
• Implement network segmentation.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).
• Install updates and patches to operating systems, software, and firmware as soon as practical after they are released. Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly.
• Use multi-factor authentication where possible.
• Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes.
• Avoid reusing passwords for multiple accounts.
• Focus on cyber security awareness and training.
• Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.