Security Market Segment LS
Wednesday, 01 July 2020 06:47

Fisher & Paykel attackers release second lot of company documents on dark web Featured

Fisher & Paykel attackers release second lot of company documents on dark web Image by Corrie Miracle from Pixabay

Attackers who used the Nefilim ransomware, that works on Windows systems, to attack appliance maker Fisher & Paykel have posted links to a second lot of documents which were stolen from the company during the attack, security sources have told iTWire.

A first lot of documents was released early in June with links being posted on the dark web.

Links to the new documents have been released as a text file and a zipped archive as the first lot were. They appear to again contain mostly financial documents.

Fisher & Paykel, which is based in New Zealand, operates in 50 countries and does its manufacturing in Thailand, China, Italy and Mexico, according to Wikipedia.

There are no recent revenue figures given by Wikipedia, but the company's 2007 revenue was NZ$1.42 billion (A$1.32 billion).

paykel second lot

A screenshot from the Nefilim site on the dark web. Supplied

In the past, the company has not responded to a request for comment. Last time, iTWire found that Fisher & Paykel had no media contacts or email addresses listed on its Australian website. Its New Zealand site had no contacts either and appeared to be out of date, with the latest press releases posted there being from 2018.

At the time, iTWire wrote to a media contact listed on one of those 2018 releases.

Now Fisher & Paykel has a line saying, "For media enquiries please contact: Andrew Luxmoore, Senior Corporate Communications Specialist", without giving any indication as to how this man can be contacted. An email address for him was obtained by chatting with a bot on the company's website.

Any reaction will be included in this story as soon as it is received.

Nefilim, which recently attacked logistics and transportation firm Toll Holdings, is one of the growing number of ransomware that exfiltrates victims' files before encrypting them on-site.

This, in effect, means that any victim is hit by both a data breach and also loses access to his/her files.

Contacted for comment, Brett Callow, a ransomware threat researcher from the New Zealand-headquartered security shop Emsisoft, said: "Nefilim publishes data in a series of instalments to maintain pressure on the company and, no doubt, to demonstrate to future victims that they can inflict pain well beyond the initial attack.

"Like Lion, F&P is to be commended for its decision to refuse to meet the criminals’ demands, but not for its security. "

Subscribe to Newsletter here

WEBINAR 12 AUGUST - Why is Cyber Security PR different?

This webinar is an introduction for cyber security companies and communication professionals on the nuances of cyber security public relations in the Asia Pacific.

Join Code Red Security PR Network for a virtual conversation with leading cyber security and ICT journalists, Victor Ng and Stuart Corner, on PR best practices and key success factors for effective communication in the Asian Pacific cyber security market.

You will also hear a success story testimonial from Claroty and what Code Red Security PR has achieved for the brand.

Please register here by 11 August 2020 and a confirmation email, along with instructions on how to join the webinar will be sent to you after registration.

Aug 12, 2020 01:00 PM in Canberra, Melbourne, Sydney. We look forward to seeing you there!



It's all about Webinars.

These days our customers Advertising & Marketing campaigns are mainly focussed on Webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial.

For covid-19 assistance we have extended terms, a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.





Guest Opinion

Guest Interviews

Guest Reviews

Guest Research & Case Studies

Channel News