Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Sports Brand Mizuno Hit with Ransomware Attack Delaying Orders

Sports Brand Mizuno Hit with Ransomware Attack Delaying Orders

Sports equipment and sportswear brand Mizuno is affected by phone outages and order delays after being hit by ransomware, BleepingComputer has learned from sources familiar with the attack.

Mizuno is a Japanese sports equipment and sportswear company with over 3,800 employees and locations throughout Asia, Europe, and North America.

The company sells a wide variety of sports equipment but are best known for their golf clubs, running sneakers, and baseball gear.

Sources who spoke to BleepingComputer on the condition of anonymity said that Mizuno suffered a ransomware attack over the weekend of February 4th, targeting the USA corporate network.

This cyberattack led to significant business disruption, including phone outages, delays in shipping products, and website issues.

Also Read: How Formidable is Singapore Cybersecurity Masterplan 2020?

The attack leads to order delays

Customers began to notice the outage last Tuesday when the corporate phone systems no longer worked, and the website began displaying a banner warning of order delays.

“MIZUNO IS CURRENTLY EXPERIENCING SYSTEM OUTAGES. ORDER DELAYS MAY OCCUR,” a notice says at the top of the mizunousa.com website.

Outage message at the top of Minuzo USA website
Outage message at the top of Mizuno USA website
Source: BleepingComputer

Customers who attempted to click on the Contact link for the website were shown messages saying there was an error connecting to that portion of the site.

If you have first-hand information about the Mizuno attack or other unreported cyberattacks, you can confidentially contact us on Signal at +16469613731 or on Wire at @lawrenceabrams-bc.

Customers told BleepingComputer that Mizuno support reps told them that their internal systems were down and they could no longer look up existing orders.

This was further confirmed by users on the Golf RWX forum who have been posting similar experiences since the outage.

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

“I just had a chat with an Mizuno representative aka ‘Caddy’, and Caddy told me their whole system is down so no one can even order anything(baseball, golf, softball, volleyball, swimming, training, ect products) from them at the moment.  Caddy also said they’re currently working on restoring their system and will be up and running tomorrow at the earliest but could be later than that,” a customer posted on the GolfWRX forums.

Other customers said they were told that shipping was delayed as Mizuno was unable to print shipping labels and that orders may be delayed up to a month.

The ransomware attack couldn’t have come at a worse time for Mizuno as they just launched their Mizuno Pro 221, 223, and 225 golf irons on February 3rd, which were preordered and eagerly anticipated by many customers.

Due to this, customers who preordered the irons have been facing delays with no way to contact the company for more information.

The IT outages are also affecting Mizuno resellers who can no longer access Mizuno’s ‘Direct Connect’ B2B website used by resellers to place orders.

Mizuno remains silent

As for Mizuno, they have been tight-lipped regarding the whole incident, not providing a public statement about what is causing their week-long outages or responding to multiple queries sent by BleepingComputer about the attack.

At this time, it is unknown what ransomware gang is behind the attack, but if the company does not pay a ransom, we will likely learn at a later date if the hackers publish stolen data.

This week has been bad for the sports industry, with the San Francisco 49ers confirming yesterday they suffered a ransomware attack by the BlackByte ransomware operation.

While details of the 49ers attack have not been disclosed, the threat actors have already started to leak invoices that they claim were stolen during the attack,

BleepingComputer will continue to try and contact Mizuno for more information and will update the story if we receive a response.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us