- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
🤖 I’m a bot that provides automatic summaries for articles:
Click here to see the summary
A ransomware group known as Cl0p claimed responsibility for breaking into a Sony server in June.
The breach occurred via a vulnerability in the file-sending MOVEit Transfer platform that SIE was using.
After the warning, SIE discovered that a breach occurred on May 28th and that hackers downloaded data off the server.
The server included personally identifiable information of US-based employees, and Sony is providing credit monitoring services to those affected.
Sony confirms this server is located in Japan and is used for internal testing for its Entertainment, Technology and Services business, according to a statement sent to Bleeping Computer.
Hackers that were responsible leaked files that included data from the SonarQube platform, certificates, a license generator, Creators’ Cloud, and more.
Saved 55% of original text.