Jack Daniel's Manufacturer Was Target of Apparent Ransomware Attack (bloomberg.com) 30
Brown-Forman, a manufacturer of alcoholic beverages including Jack Daniel's and Finlandia, said it was hit by a cyber-attack in which some information, including employee data, may have been impacted. From a report: The company, which is based in Louisville, Kentucky, said in a statement it was able to prevent its systems from being encrypted, which is normally caused by ransomware attacks. It provided few other details about the incident, including when it happened or how the hackers accessed the data. "We are working closely with law enforcement, as well as world class third-party data security experts, to mitigate and resolve this situation as soon as possible," the company said. "There are no active negotiations."
Re: (Score:1)
Nice one Tell them to just jack off! (Score:2)
Nice one Tell them to just jack off!
Good for them (Score:4, Insightful)
Re: (Score:2)
Must have been an accident. An IT employee sampling products on the job and accidentally hit the eject button on the tape drive.
Or they have Crowdstrike or similar (Score:3)
Crowdtrike is one security product that will prevent the data from being encrypted, in most cases.
Their detection method can also false positive and think Microsoft's distributed file system (DFS) is a ransomware after last week's update. This in turn can cause me to have a long day yesterday, but it'll stop ransomware immediately.
Any makers of agent-based security software who want to be able to immediately stop ransomware can contact me for the details of how to detect it in a way that applies to large va
Re: (Score:2)
think Microsoft's distributed file system (DFS) is a ransomware
It's not?
Re: (Score:2)
Want this bullshit to stop? (Score:3)
I say make computer security a legal liability.
If a company is successfully attacked by ransomware and employee data is compromised, the employees should be able to sue their employer for damage. The employer would then have to prove they did everything they could to secure the data.
If they can prove the IT was sound, the employer should then ba able to turn around and sue the software manufacturer, whose product was exploited. In turn, if the software manufacturer can prove their software was developed with security in mind, and the exploit was done through a CPU flaw for example, they should be able to sue the CPU maker.
It'd be a chain of liability, in which all the actors are required to prove they used best practice, and the offenders face fines and jail time. I guarantee you, with a law like this, you'll suddenly see an entire industry appear, dedicated to professionalizing IT security across the board - schooling people in security in development, IT deployment and administration, quality certification and security audits... Everybody in the IT sphere would suddenly raise in competency, their wages would go up, and malware attacks would go down dramatically.
But as long as it's handled by dudes who do their best without really knowing what they're doing, and risk nothing when something goes south, this sort of shenanigans will keep on going.
and IT unions! (Score:2)
and IT unions!
Re: (Score:2)
It is unfortunate but it will require custodial sentences. Tech companies time and time again have actively broken the law, got caught and paid a minor fine, which is exceeded by the income generated by breaking the law. No executive decision maker custodial sentences no change in behaviour, those sentences should also apply to board members for their failed jurisprudence they are appointed to oversee the legal functioning of that corporation, they were criminally negligent in that role.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Somethin' better (Score:1)
People might have to drink good liquor now! Lately I've been drinking calvados with soda water. Jack & Coke tastes like bathtub gin or bum wine in comparison.
Re: (Score:2)
People might have to drink good liquor now! Lately I've been drinking calvados with soda water. Jack & Coke tastes like bathtub gin or bum wine in comparison.
Quality calvados is really nice, but please stop destroying it with soda water. That's blasphemy similar to mixing a good single malt whisky with coke. Just don't.
Yes, they got pwned (Score:2)
Reading between the lines:
- Some data WAS encrypted, but they stopped all of it from getting encrypted.
- Employee data was encrypted. They paid off the hackers to get it back.
- They're not CURRENTLY negotiating with the hackers. They paid. Got the keys. Decrypted. Done.
- The hackers didn't release "all the data we downloaded" - because they got paid.
It doesn't help other companies, other sysadmins, or other people in security positions when companies pretend they magically got around an attack like thi
backups (Score:2)
Or, you know, maybe they actually have a proper backup system in place?
If the backup system is clearly append-only, and if they practice proper tape rotation, and they test the backups, there will be little bit lost here and there, but most of the disaster will be solved with just the IT department grumbling about the extra work.
Re: (Score:1)
Re: (Score:1)
Reading between the lines:
Or you could just read the last line where the hacker said they got nothing. But that's not as fun. Let's go back to reading between the lines: This is just an attempt by Joe Biden to cut off Trump's alcohol supply. Another example of external interference in our elections!
Re: (Score:2)
If you can't tell these apart maybe corona has destroyed your sense of taste.
Johnny Walker is actually Scotch. Blended Scotch, but still scotch.
Finlandia (Score:1)