In an 8-K filing with the SEC, Bassett Furniture said it shut down some of its IT systems following a ransomware attack it discovered on July 10.
“The threat actor disrupted the Company’s business operations by encrypting some data files. As a result of the Company’s containment measures, which included shutting down some systems, the Company has not been, and, as of the date of this Report is not operating its manufacturing facilities.
“The Company’s retail stores and e-commerce platform are open, and customers are able to place orders and purchase available merchandise; however, the Company’s ability to fulfill orders is currently impacted,” Bassett Furniture said in the 8-K filing.
“[…] the incident has had and is reasonably likely to continue to have a material impact on the Company’s business operations until recovery efforts are completed,” Bassett Furniture admitted.
No ransomware group has come forward to take credit for the incident as of Tuesday afternoon.
Evan Dornbush, former NSA cybersecurity expert had this to say:
“The 8-K disclosure does not explicitly make clear that Bassett has been prompted to pay a ransom and with none of the more notorious actors yet coming forward to claim credit, it could be the breach was by a newer operator appearing on to the scene without the refined processes seen by the more established groups.
“The cybersecurity community needs to do a better job of prohibiting new actors from emerging, ensuring manufacturing and retail sectors don’t have to experience downtime and face other material impacts.”
Stephen Gates, Principal Security SME, Horizon3.ai followed with this:
In Bassett Furniture’s recent Form 8-K filing with the SEC, the company announced a disruption in its operations due to a cyber incident. It appears that a threat actor may have gained a foothold inside the company’s business operations network, likely leading to a human-operated, ransom-based attack.
Considering the potential virtual connectivity between Bassett’s business network and its suppliers for ordering and fulfilling raw materials, I would recommend investigating the breach from the perspective that the attacker might have first gained access through a supplier’s network. This scenario is highly probable in today’s interconnect supply chains.
If this were the case, the attacker, once inside Bassett’s business system, would have likely escalated their privileges, moved laterally within the network, accessed critical data, and encrypted it as part of the ransom attack. Consequently, Bassett’s response appears to have included disconnecting their production network from the business network as a containment measure.
Manufacturers and organizations with supply chains must acknowledge that their cyber risk now extends to their suppliers as well. I highly advise organizations with supply chains to incorporate third-party risk management using continuous cyber risk assessments into their risk management plans. Autonomous cyber risk assessment technologies that provide continuous and affordable assessments are readily available to help meet these types of directives.
I said this yesterday. Companies can either spend money up front to protect themselves, or spend even more money after getting pwned. The choice is theirs.
Discounting Dominates Prime Day Says Salesforce data
Posted in Commentary with tags Salesforce on July 19, 2024 by itnerdAmazon reported its biggest sales this year via Prime Day. Here’s some key Canadian and global data which provides a snapshot based on the activity of 1.5 billion shoppers globally across Commerce Cloud and other Salesforce products.
Canadian data shows:
Global data shows:
This data was provided by Salesforce.
Leave a comment »