{"id":21296,"date":"2023-02-20T16:10:49","date_gmt":"2023-02-21T00:10:49","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/02\/20\/news-15028\/"},"modified":"2023-02-20T16:10:49","modified_gmt":"2023-02-21T00:10:49","slug":"news-15028","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/02\/20\/news-15028\/","title":{"rendered":"Chip company loses $250m after ransomware hits supply chain"},"content":{"rendered":"<p>Applied Materials, one of the world&rsquo;s leading suppliers of equipment, services, and software for the manufacture of semiconductors, has warned that its second-quarter sales are&nbsp;likely to be&nbsp;hurt to the tune of $250 million due to a&nbsp;cybersecurity attack&nbsp;at one of its suppliers.<\/p>\n<h2>MKS Instruments Inc.<\/h2>\n<p>In the <a href=\"https:\/\/ir.appliedmaterials.com\/news-releases\/news-release-details\/applied-materials-announces-first-quarter-2023-results\" target=\"_blank\">announcement<\/a> of first quarter results and the second quarter forecast Applied Materials mentions a:<\/p>\n<blockquote>\n<p>&ldquo;negative estimated impact of $250 million dollars related to a cybersecurity event recently announced by one of our suppliers&rdquo;<\/p>\n<\/blockquote>\n<p>And although Applied Materials did not name the supplier, it&#8217;s thought&nbsp;that the victim is MKS Instrument Inc; a vendor that <a href=\"https:\/\/investor.mks.com\/news-releases\/news-release-details\/mks-reschedules-fourth-quarter-and-full-year-2022-earnings-call\">a week ago said<\/a> a ransomware&nbsp;attack would force it to delay the release of its own quarterly results.<\/p>\n<h2>Ransomware<\/h2>\n<p>On February 16, 2023, MKS filed <a href=\"https:\/\/oag.ca.gov\/system\/files\/Template%20Notification%20to%20Affected%20Data%20Subjects%20-%20MKS.pdf\" target=\"_blank\">notice of a data breach<\/a> after learning of the ransomware attack that&nbsp;resulted&nbsp;in sensitive employee information being made accessible to an unauthorized party.&nbsp;<\/p>\n<p>MKS said the&nbsp;attack has impacted the company&rsquo;s ability to process orders, ship products, and provide service to customers in the company&rsquo;s Vacuum Solutions and Photonics Solutions Divisions. The full scope of the costs and related impacts of this incident, including the extent to which the company&rsquo;s <a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/07\/4-ways-businesses-can-save-money-on-cyber-insurance\">cybersecurity insurance<\/a> may offset some of these costs, has not been determined.<\/p>\n<p>More details about the attack have not yet been released, but we will keep you informed when we learn more about it.<\/p>\n<h2>Supply chain effects<\/h2>\n<p>While we have talked at length about the risks of <a href=\"https:\/\/www.malwarebytes.com\/glossary\/supply-chain-attack\">getting infected through your supply chain<\/a>, this incident goes to show that even if none of your systems themselves get infected, an attack at one of your suppliers can have significant financial repercussions for your organization.<\/p>\n<p>A supply chain attack is, essentially, another way for attackers to compromise their target company. Instead of them attacking their target directly, they go for the weakest link in that company&rsquo;s supply chain: a vendor that may not have as secure a system as their main target.<\/p>\n<h2>Chip equipment industry<\/h2>\n<p>There is no good time for a ransomware attack, but this one comes with very bad timing. Of all the component shortages we&rsquo;ve seen in recent years, by far the most severe has been for certain <a href=\"https:\/\/www.jabil.com\/blog\/global-chip-shortages.html\" target=\"_blank\">semiconductors, aka chips<\/a>.<\/p>\n<p>It has to be mentioned that the semiconductor manufacturing equipment industry is a special case. It is a very specialized and <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2023-02-15\/asml-says-ex-employee-in-china-misappropriated-chip-data\" target=\"_blank\">espionage sensitive industry<\/a> where a few companies dominate the global market. In such a market, the stagnation at an important supplier, who can not be replaced on short notice, can have a huge impact on your own results. As demonstrated here.<\/p>\n<h2>How to avoid ransomware<\/h2>\n<ul>\n<li><strong>Block common forms of entry<\/strong>. Create a plan for <a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">patching vulnerabilities<\/a> in internet-facing systems quickly; disable or <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/03\/blunting-rdp-brute-force-attacks-with-rate-limiting\">harden remote access<\/a> like RDP and VPNs; use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">endpoint security software<\/a> that can detect exploits and malware used to deliver ransomware.<\/li>\n<li><strong>Detect intrusions<\/strong>. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Use <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">EDR<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/business\/managed-detection-and-response\">MDR<\/a> to detect unusual activity before an attack occurs.<\/li>\n<li><strong>Stop malicious encryption<\/strong>. Deploy Endpoint Detection and Response software like <a href=\"https:\/\/www.malwarebytes.com\/business\/edr\">Malwarebytes EDR<\/a> that uses multiple different detection techniques to identify ransomware.<\/li>\n<li><strong>Create offsite, offline backups<\/strong>. Keep backups offsite and offline, beyond the reach of attackers. Test them regularly to make sure you can restore essential business functions swiftly.<\/li>\n<li><strong>Write an incident response plan<\/strong>. The period after a ransomware attack can be chaotic. Make a plan that outlines how you&#8217;ll isolate an outbreak, communicate with stakeholders, and restore your systems.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/chip-company-loses-250m-after-ransomware-hits-supply-chain\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/news\" rel=\"category tag\">News<\/a><\/p>\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/ransomware\" rel=\"category tag\">Ransomware<\/a><\/p>\n<p>Tags: Applied materials<\/p>\n<p>Tags:  MKS<\/p>\n<p>Tags:  ransomware<\/p>\n<p>Tags:  semiconductor<\/p>\n<p>Applied Materials has said it expects to miss $250 million in second-quarter sales due to a ransomware attack at a supplier.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/chip-company-loses-250m-after-ransomware-hits-supply-chain\" title=\"Chip company loses $250m after ransomware hits supply chain\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/02\/chip-company-loses-250m-after-ransomware-hits-supply-chain\">Chip company loses $250m after ransomware hits supply chain<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[28715,28716,32,3765,17097],"class_list":["post-21296","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-applied-materials","tag-mks","tag-news","tag-ransomware","tag-semiconductor"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21296","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=21296"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/21296\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=21296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=21296"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=21296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}