In a statement issued on July 3rd, Pepsi Bottling Ventures said that on January 10th it had learned that a breach of its internal systems dating back more than six months may have led to current and former employees and contractors’ data being stolen around December 23rd of last year.
The PepsiCo bottler said it had taken action to “contain the incident” but the incident may have led to the capture of employees’ data including:
- First and last names
- Parents’ maiden names
- Home address
- Email address
- Financial account information
- Passwords
- PIN codes
- Driver license #s
- ID card #s
- SSNs
- Passport info
- Digital signatures
- Information related to benefits and employment
- Limited medical history
- Health and health insurance claims
- Insurance policy numbers
“The safety of individual personal information is of the utmost importance to us. Pepsi Bottling Ventures promptly reported the incident to law enforcement, suspended all affected systems, and investigated to understand the scope and impact of the incident,” PBV said.
I’ll bit my tongue for a moment. Instead, I will turn this over to Willy Leichter, PV of Marketing, Cyware for commentary:
“Unfortunately, this type of long delay in discovering and acting upon a breach is all too common. But saying that they have “contained” the breach after not discovering it for six months stretches credulity. Indicators of compromise of breaches need to be discovered in hours or days for there to be any chance of limiting the damage.”
Roy Akerman, Co-Founder & CEO, Rezonate follows up with this:
“Unlike a credit card, username, password and other personally identifiable information (PII), an identity cannot be simply replaced and will be forever compromised and at risk. The highest paying intel on the dark web was and will continue to be PII and healthcare information. Identity data will therefore continue to be the number one target and the means which attackers leverage to compromise systems and organizations. “
Six months is a very long time to notify people of a data breach. That’s not cool. Pepsi Bottling Ventures needs to do much better on this front. And others should take note of how this was handled and not be Pepsi Bottling Ventures.


Japanese Port Used By Toyota Pwned By LockBit
Posted in Commentary with tags Hacked on July 5, 2023 by itnerdThe largest port in Japan at Nagoya, which services Toyota Motor Corporation, is suffering a ransomware attack that has shut down operations of container terminals.
The Nagoya Port Unified Terminal System (NUTS) in Japan suffered a significant system outage on Tuesday that was attributed to a ransomware attack.
According to a notice (in Japanese) sent to customers, the attack disrupted container operations across all terminals within the port.
In particular, container import and export operations via trailer transportation have been temporarily halted at the terminals. Shipping companies responsible for the arrival and departure of container vessels are advised to consult with the primary carrier for instructions and updates regarding loading and unloading operations.
And:
The restoration of the system is targeted to be completed by 6.00pm JST today (July 5), followed by a planned resumption of operations starting at 8.30am JST on July 6 (Thursday).
That’s pretty quick. As for who is behind this, it is said that the LockBit ransomware gang is behind this.
Roy Akerman, Co-Founder & CEO, Rezonate had this to say:
“Critical infrastructure remains a key concern as the risk of business disruptions impacts millions of people and businesses dependent on goods shipped in and out of the Nagoya port daily. The Nagoya port is a good reminder that critical infrastructure is at constant risk and nations need to protect and apply the best of breed technologies to prevent, detect and quickly respond and, as in this case, instantly recover operations.”
This is another example of how disruptive that these sorts of attacks can be. After all, this one is affecting a port that services Toyota. Which means that there will still be ripple effects from this even after things are restored to normal.
UPDATE:
Carol Volk, EVP, BullWall added this:
“Ransomware attacks like the recent one on the Port of Nagoya have become inevitable. The expanding digital landscape provides more entry points for hackers, while the potential financial gains make these attacks lucrative. As a result, companies must prepare their cyber defenses, including ransomware containment.
“Such a system can detect and mitigate attacks early, minimizing damage and disruption. Organizations should also prioritize regular backups, strong security measures, employee training, and incident response plans. By acknowledging the inevitability of ransomware attacks and taking proactive measures, businesses can enhance their resilience and safeguard critical systems, before the attack comes for them.”
Leave a comment »