Acer server in Europe reportedly breached
Pakastani hacker group claims it accessed personal data on 40,000 people
Computerworld - Hacking group Pakistan Cyber Army on Friday claimed it had broken into an Acer server in Europe and stolen personal data on about 40,000 people.
The group claimed that it also stole several pieces of source code that were stored on the compromised computer.
News of the breach was first reported today by The Hacker News (THN), which published screenshots showing samples of the allegedly compromised data, including names, email addresses, phone numbers and other information stored on the server.
THN said the Pakistan Cyber Army (PCA) contacted it earlier today to inform it of the attack on the Acer system and the theft of personal data.
Lisa Emard, director of media relations for Acer America, said the company's U.S. operations have no information on the breach. The company is trying to get a response to the PCA claims from its European officials, she added.
The breach comes as Acer, the second-largest manufacturer of laptop computers in the world, faces increased scrutiny of its financial reporting practices.
On Thursday, Acer's stock price tumbled precipitously on the Taiwan stock exchange after an audit uncovered irregularities in the company's inventory and audit receivables information, according to a Bloomberg report.
The findings will result in a one-time $150 million write-off for Acer, Bloomberg said.
A brief statement posted on Acer's U.S. site said that company Chairman and CEO J.T. Wang would take responsibility for the charge "by relinquishing total remuneration from his position as director of the company board, as well as employee bonus of 2010."
It's unclear if the hacking attack had anything to do with the company's financial woes.
Acer is just one of several large companies that have been compromised recently. Others in the news as a result of similar break-ins just this past week include Lockheed Martin, L-3 Communications and Sony.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts