Advanced Technology Ventures discloses ransomware attack and data breach
The American venture capital firm Advanced Technology Ventures (ATV) disclosed a ransomware attack, crooks also stole data of some private investors.
Advanced Technology Ventures (ATV) is an American venture capital firm with more than $1.8 billion in capital under management. The venture capital firm this week disclosed a ransomware attack, threat actors have also stolen the personal information of some of its private investors.
ATV reported that the security breach took place in July, the ransomware operators stole financial information stored on two servers before encrypting them.
“On July 9, 2021 the Company learned from its third-party information technology provider that there had been anomalous activity on two identical ATV servers (the “Servers”) on which the Company stored financial reporting information. The Company soon determined that the Servers had been encrypted by a ransomware attack. On July 26, 2021, the Company learned that there was evidence of both unauthorized access to and exfiltration of the contents of the Servers.” reads a data breach notification letter sent to affected Maine residents.
Stolen data includes names, emails, phone numbers, and Social Security Numbers of some private investors.
Advanced Technology Ventures states that 300 individuals have been affected.
“We are not at this time aware of any fraud or misuse of your information as a result of this incident,” states the company. “We also required all employees to change their access credentials and deployed additional endpoint protection on our corporate network to help prevent this type of incident from reoccurring in the future,”
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
The post Advanced Technology Ventures discloses ransomware attack and data breach appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.