• WD Data Hack

    From Alan B@21:1/5 to All on Sat May 6 12:56:20 2023
    As many of us know this hack occurred some weeks ago but it was not until this morning that WD officially notified me by email of the incident. Just as well
    I take the usual precautions as mentioned in the email. Better late than never I guess!

    <https://www.securityweek.com/leaked-files-show-extent-of-ransomware-groups-access-to-western-digital-systems/>

    --
    Cheers, Alan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Chris@21:1/5 to Alan B on Sat May 6 16:05:45 2023
    Alan B <alanrichardbarker@gmail.com.invalid> wrote:
    As many of us know this hack occurred some weeks ago but it was not until this
    morning that WD officially notified me by email of the incident. Just as well I take the usual precautions as mentioned in the email. Better late than never
    I guess!

    <https://www.securityweek.com/leaked-files-show-extent-of-ransomware-groups-access-to-western-digital-systems/>

    What precautions does the email mention?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Theo@21:1/5 to Alan B on Sat May 6 19:03:05 2023
    Alan B <alanrichardbarker@gmail.com.invalid> wrote:
    As many of us know this hack occurred some weeks ago but it was not until this
    morning that WD officially notified me by email of the incident. Just as well I take the usual precautions as mentioned in the email. Better late than never
    I guess!

    I just got an email with giant images from: https://client-data.knak.io/production/email_assets/ http://res.prod1.email.westerndigital.com/res/wdc_mkt_prod1/

    full of lovely tracking URLs, but no text in the HTML. Of course there was
    no plaintext part either.

    Needless to say, I block remote content from emails. So I'm none the wiser what it said.

    Theo

    (and really WD, not even using HTTPS for your tracking?)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Joerg Lorenz@21:1/5 to All on Sat May 6 20:58:21 2023
    Am 06.05.23 um 20:03 schrieb Theo:
    Alan B <alanrichardbarker@gmail.com.invalid> wrote:
    As many of us know this hack occurred some weeks ago but it was not until this
    morning that WD officially notified me by email of the incident. Just as well
    I take the usual precautions as mentioned in the email. Better late than never
    I guess!

    I just got an email with giant images from: https://client-data.knak.io/production/email_assets/ http://res.prod1.email.westerndigital.com/res/wdc_mkt_prod1/

    full of lovely tracking URLs, but no text in the HTML. Of course there was no plaintext part either.

    Needless to say, I block remote content from emails. So I'm none the wiser what it said.

    Theo

    (and really WD, not even using HTTPS for your tracking?)

    *These links smell very fishy*

    --
    Gutta cavat lapidem (Ovid)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan B@21:1/5 to Theo on Sat May 6 19:42:41 2023
    Theo <theom+news@chiark.greenend.org.uk> wrote:
    Alan B <alanrichardbarker@gmail.com.invalid> wrote:
    As many of us know this hack occurred some weeks ago but it was not until this
    morning that WD officially notified me by email of the incident. Just as well
    I take the usual precautions as mentioned in the email. Better late than never
    I guess!

    I just got an email with giant images from: https://client-data.knak.io/production/email_assets/ http://res.prod1.email.westerndigital.com/res/wdc_mkt_prod1/

    full of lovely tracking URLs, but no text in the HTML. Of course there was no plaintext part either.

    Needless to say, I block remote content from emails. So I'm none the wiser what it said.

    Theo

    (and really WD, not even using HTTPS for your tracking?)

    Oh dear, have I been phished? Would you like to analyse the email raw
    source - I can email it if you wish?

    --
    Cheers, Alan

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)