Cyber Attacks

Acer hit with second cyberattack within a week


Acer has confirmed another cyberattack on its servers in Taiwan after their offices in India were hit less than a week ago by the same group.

The Desorden Group claimed responsibility for both attacks and stated that they conducted the second attack in order to prove their point “that Acer is way behind in its cybersecurity effects on protecting its data and is a global network of vulnerable servers.”

According to Steven Chung, a spokesperson at Acer, the company recently detected an isolated attack on their local after-sales service system in India and a further attack in Taiwan.

Upon detection, they immediately initiated their security protocols and conducted a full scan of the systems. The company is notifying all potentially affected customers in India, while the attacked Taiwan system does not involve customer data.

He added that the incident has been reported to local law enforcement and relevant authorities, and has no material impact to their operations and business continuity.

According to the Desorden group, they have hacked Acer’s Taiwan servers that stored data on its employees and product information.

The group stated that they did not steal all data, but only took data pertaining to their employee details. Immediately after the breach, the group informed Acer management on the Taiwan server breach and Acer has since taken the affected server offline.

A few other of its global networks including Malaysia and Indonesia servers are also vulnerable.

The group did not mention how much data they stole in this attack.

The attack on the company’s servers in India last week led to 60GB of files being stolen by the Desorden Group, which also claimed an attack on the Malaysian servers of ABX Express Enterprise in September.

Priyanka R
Cyber Security Enthusiast, Security Blogger, Technical Editor, Author at Cyber Safe News

    Facebook, Whatsapp and Instagram back after outage

    Previous article

    Millions of Android users targeted in subscription fraud campaign

    Next article

    You may also like


    Leave a reply

    Your email address will not be published. Required fields are marked *