Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireCybersecurity News

Gigabyte victim to ransomware again

By Maria Henriquez
data-leak-freepik2067.jpg
October 22, 2021

Gigabyte Technology, a Taiwanese manufacturer and distributor of computer hardware, has allegedly suffered a massive data breach as a result of a ransomware attack. 


The AvosLocker ransomware gang is claiming to be behind the breach, leaking a sample of “stolen files” from Gigabyte’s network and offering to sell the rest of the data.


The threat actors posted a “press release,” announcing that it had hacked the Taiwanese company. PrivacySharks and Threatpost confirmed the leaked files appear to contain confidential details regarding deals with third-party companies and personally identifiable information about employees. 


“Gigabyte INC suffered a breach, and this is a sample of the files we’ve downloaded from their network. Barracuda NDA + full dir list leaked in [the] sample,” AvosLocker said. 


The ransomware group has threatened to leak more data from Gigabyte’s network if the company refuses to negotiate, according to PrivacySharks. In addition, PrivacySharks researchers say, “We hope that there are no Gigabyte private master keys included in this leak which could potentially see a new supply chain attack like the Solarwinds Supply Chain Attack. If the leak does include keys, these could be used to impersonate Gigabyte, forcing servers and motherboards to download fake updates and drivers, etc.”


The leaked data contains files from as recently as May 2021, as reported by PrivacySharks, and includes the following:

  • Potential credit card details. Fortunately, if these files contain credit card information, the credit cards may be expired as this folder is from 2014.
  • Password and username details.
  • Employee payroll details.
  • HR agreements with consultants as well as full names, images, and CVs.
  • 10 PDF documents in a file named ‘Passports.’
  • Information on over 1,500 job candidates, including full names, CVs, resumes, and applications. There are also Zoom internet details with what appears to be personal information on each candidate.
  • A folder named ‘Mailchimp’ containing GSM Account Database information. This could include email addresses.
  • A zip folder containing an NDA and information of a deal with Barracuda Networks worth $100,000+
  • In addition to Barracuda Networks, the leak includes various data from the following well-known companies: Blizzard, Black Magic, Intel, Kingston, Amazon, BestBuy.
  • A .txt file named ‘Tree’ containing 133,352 lines of folder and file names stolen in the breach.
  • Business expenses from trips such as ‘Hawaii 2019’, including money spent on Luau drinks, uber trips, and tips.
  • Images from company events, including Christmas parties, Halloween parties, and ‘Tony’s Birthday.’


Furthermore, the leaked data risks not only company reputation, but also Gigabyte’s relationships with third-party companies as highly confidential deals and NDAs have been exposed. 


Chris Morgan, Senior Cyber Threat Intelligence Analyst at Digital Shadows, a San Francisco-based provider of digital risk protection solutions, says, “The recent incident affecting Gigabyte is the second time the Taiwanese company has been impacted by a ransomware attack in the past three months. The RansomExx group targeted Gigabyte in August 2021, which resulted in the theft of 112GB of data. However, it is yet unclear whether this is connected to the recent attack by AvosLocker.”


Avoslocker is a relatively new ransomware group and was first observed in June 2021, Morgan explains. “They are based on the ransomware-as-a-service (RaaS) business model. This involves ransomware developers renting out their malware and infrastructure to affiliates, who conduct attacks on their behalf in return for a share of profits. AvosLocker is distinctive due to its use of an auction feature for stolen data, which the group introduced in mid-September; this followed the introduction of a similar feature by the REvil group in June 2021. This allows interested parties to pay for the data that AvosLocker steals from their victims, though it is unclear how successful this feature has been in terms of providing an additional revenue source for the group.”


“The details in the file tree should be extremely concerning to Gigabyte as they consider the impact of this breach, notes Jake Williams, Co-Founder and CTO at BreachQuest, an Augusta, Georgia-based leader in incident response. “In most double extortion schemes, the data theft focuses on quantity rather than quality. The file tree from this dump suggests that, in this case, the threat actor focused on quality. The AvosLocker double extortion model includes the sale of data for those that don’t pay, rather than just free release. To facilitate sales, AvosLocker must steal data that’s worth buying. The file tree (directory listing) teased by AvosLocker certainly appears to be the kind of data that would be valuable to a multitude of cybercriminals. In addition to personal data, the dump would also seemingly include contract details that will doubtlessly damage relationships with vendors and cause significant reputational losses for Gigabyte. It also seems likely there are trade secrets included in the dumps. However, the quantity and quality of those trade secrets are difficult for outsiders to evaluate based on file and directory names. But one thing is for sure — Gigabyte is feverishly evaluating the contents of the files in the directory listings and evaluating the impact of their probable release.”

KEYWORDS: cyber security data breach ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maria Henriquez is a former Associate Editor of Security. She covered topics including cybersecurity and physical security, risk management and more.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • black screen with multicolored text and white lock

    50 percent of organizations fell victim to ransomware in 2022

    See More
  • criminal-on-laptop.jpg

    Lumen falls victim to 2 ransomware attacks

    See More
  • BOSE

    Bose victim of ransomware attack

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing