Yamaha confirms cyberattack after multiple ransomware gangs claim attacks

Yamaha confirms cyberattack after multiple ransomware gangs claim attacks
Yamaha’s Canadian music division confirmed that it recently dealt with a cyberattack after two different ransomware groups claimed to have attacked the company.

The Yamaha Corporation — different from the spun-off motorcycle division — is a Japanese manufacturing giant producing musical instruments and audio equipment. It is considered the world’s largest producer of musical equipment.

In a statement last Thursday, Yamaha Canada Music said it “recently encountered a cyberattack that led to unauthorized access and data theft.”

“In response, we swiftly implemented measures to contain the attack and collaborated with external specialists and our IT team to prevent significant damage or malware infiltration into our network,” the company said.

“Yamaha Canada has been notifying affected individuals, and we are offering credit monitoring services to those at risk of potential harm. Additionally, we have taken decisive actions to reinforce our network defenses and ensure enhanced security measures moving forward.”

The company added that its primary focus right now is to “mitigate any adverse consequences stemming from this criminal act.”

Representatives did not respond to requests for comment about whether the incident involved ransomware but the company is the latest example of a growing cybersecurity trend drawing alarm among experts.

On June 14, the company was posted on the Black Byte ransomware gang’s list of victims, according to cybersecurity expert Dominic Alvieri. But on Friday, Yamaha appeared on the leak site of the Akira ransomware group.

Alvieri said it is becoming increasingly common for victim organizations to be posted by two different ransomware groups. He noted that at least one organization this year was posted by three different groups.

“It is a major trend this year,” he said. “There is way more double posting going on.”

There have been several high-profile double postings this year, including the city of Oakland, which appeared on the leak sites of the Play and LockBit ransomware gangs.

Seasoned ransomware experts did not have a clear answer on why victims are showing up on multiple leak sites, floating several theories that may be driving the trend.

Recorded Future ransomware researcher Allan Liska said double postings do appear to be happening more often.

“I think it is affiliates working for two different groups, trying to bring more attention to their victims. It is a win for the affiliate and the ransomware as a service group because it brings more attention to the victim, better for coercing ransom payments and it gives the ransomware-as-a-service group more ‘clout,’” he said.

“It would be interesting to see how the payment structure on these listings work. Like do all three parties split the ransom or only the RaaS group that the victim pays through plus the affiliate?”

Other experts wondered whether cybercrime gangs are simply operating multiple ransomware “brands” and moving between each.

“A third option is operations collaborating and sharing data on multiple sites to maximize their reach,” said Emsisoft threat analyst Brett Callow. “Without more information, it’s impossible to say what’s happening.”

BlackByte initially emerged in September 2021 with a poorly-coded ransomware, according to experts. The cybersecurity firm Trustwave found a weakness in it and used it to create a free decrypter.

But the group created a second version of the ransomware, which solved the bugs found by Trustwave, and have been able to launch several attacks since.

The FBI released a security alert about BlackByte just one day before it drew global headlines for an attack on the San Francisco 49ers on the same day as the Super Bowl.

The Akira ransomware group, meanwhile, was first identified in March 2023 before taking credit for several high-profile incidents — including attacks on the government of Nassau Bay in Texas, Bluefield University, a state-owned bank in South Africa and major forex broker London Capital Group.

Researchers noted that the Akira ransomware bears several similarities to the Conti ransomware, which they said “may indicate that the malware authors were at least inspired by the leaked Conti sources.”