Acer server in Europe reportedly breached
Pakastani hacker group claims it accessed personal data on 40,000 people
Computerworld - Hacking group Pakistan Cyber Army on Friday claimed it had broken into an Acer server in Europe and stolen personal data on about 40,000 people.
The group claimed that it also stole several pieces of source code that were stored on the compromised computer.
News of the breach was first reported today by The Hacker News (THN), which published screenshots showing samples of the allegedly compromised data, including names, email addresses, phone numbers and other information stored on the server.
THN said the Pakistan Cyber Army (PCA) contacted it earlier today to inform it of the attack on the Acer system and the theft of personal data.
Lisa Emard, director of media relations for Acer America, said the company's U.S. operations have no information on the breach. The company is trying to get a response to the PCA claims from its European officials, she added.
The breach comes as Acer, the second-largest manufacturer of laptop computers in the world, faces increased scrutiny of its financial reporting practices.
On Thursday, Acer's stock price tumbled precipitously on the Taiwan stock exchange after an audit uncovered irregularities in the company's inventory and audit receivables information, according to a Bloomberg report.
The findings will result in a one-time $150 million write-off for Acer, Bloomberg said.
A brief statement posted on Acer's U.S. site said that company Chairman and CEO J.T. Wang would take responsibility for the charge "by relinquishing total remuneration from his position as director of the company board, as well as employee bonus of 2010."
It's unclear if the hacking attack had anything to do with the company's financial woes.
Acer is just one of several large companies that have been compromised recently. Others in the news as a result of similar break-ins just this past week include Lockheed Martin, L-3 Communications and Sony.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts