[ad_1]

The California-based networking {hardware} producer ‘A10 Networks’ has confirmed to BleepingComputer that the Play ransomware gang briefly gained entry to its IT infrastructure and compromised knowledge.
A10 Networks specializes within the manufacturing of software program and {hardware} software supply controllers (ADC), identification administration options, and bandwidth administration home equipment, whereas it additionally provides firewall and DDoS menace intelligence and mitigation providers.
Its clients embody Twitter, LinkedIn, Samsung, Uber, NTT Communications, Sony Pictures, Windows Azure, Xbox, Yahoo, Alibaba, China Mobile, Comcast, Deutsche Telekom, Softbank, GE Healthcare, GoDaddy, and Huffington Post.
In an 8-Okay submitting submitted earlier this week, the corporate says the safety incident occurred on January 23, 2023, and lasted for a number of hours earlier than its IT group managed to cease the intrusion and include the harm.
The firm’s investigation decided that the menace actors managed to realize entry to shared drives, deployed malware, and ‘compromised’ knowledge associated to human assets, finance, and authorized features.
Despite the profitable community intrusion, the agency says the safety incident has not impacted any of its merchandise or options and can’t have affected its clients.
“Working with outside experts, the Company has contained the attack within its network and has notified the appropriate law enforcement authorities of the incident,” reads the 8-Okay submitting.
“The Company currently does not expect this incident to have a material impact on its operations.”
The Play ransomware gang added A10 Networks to its extortion website yesterday, threatening to leak the recordsdata it stole through the intrusion on Sunday.

The menace actors declare to own confidential recordsdata, together with technical documentation, worker and shopper paperwork, agreements, and private knowledge.
The Play ransomware group has change into probably the most energetic gamers, identified for concentrating on a Microsoft Exchange flaw to realize distant code execution (RCE) and infiltrate sufferer networks.
The gang has just lately compromised the Belgian metropolis of Antwerp, the H-Hotels lodge chain in central Europe, the Arnold Clark automobile retailer, and the cloud computing providers supplier Rackspace.
