Acer confirms new attack on servers

An abstract image of padlocks overlaying a digital background.
(Image credit: Shutterstock)

Acer has confirmed that its servers in Taiwan have also been breached, after hackers themselves shared details about the incident with privacy watchdogs, PrivacyAffairs.

The incident comes days after the same threat actor that identifies itself as the Desorden Group, was auctioning data it had managed to extract from the after-sales service system in India.

“We have recently detected an isolated attack on our local after-sales service system in India and a further attack in Taiwan,” confirmed Acer spokesperson Steven Chung in a statement.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Chung pointed out that unlike the breach in India, the attacked server in Taiwan contained no customer information, without giving more details. Desorden however shared that the server contained product information and employee data, adding that it only grabbed the latter.

More to follow?

Referring to Acer as a “global network of vulnerable servers” Desorden claims that besides the breached servers in India, and Taiwan, Acer servers in Malaysia, and Indonesia are just as vulnerable.

According to samples shared by the hackers, the breach of the Taiwanese servers has leaked internal documents, personally identifiable information (PII) of its employees, as well as what appears to be login credentials to some of Acer’s Taiwanese servers and internal admin panels.

Tim Wade, technical director, at cybersecurity company Vectra AI tells TechRadar Pro that breaches such as the one suffered by Acer show that businesses must rethink their protective strategies. Instead of focusing on traditional prevention tools, businesses must assume that they’ve already been breached, and work backwards to build resilience. 

“By assuming you’re compromised and actively searching for signs of an attack, you are in a much stronger position to detect all sorts of attacks in good time and stop them before they become breaches,” reasons Wade.

Via PrivacyAffairs

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
HPE
HPE investigating claims that hacker breached developer environments, source code
A person with a laptop using a credit card online.
Avery label maker confirms attack on its site, customer credit card info stolen
A computer being guarded by cybersecurity.
Wacom warns users their data may have been stolen in breach
No broadband network
Massive online data breach sees 2.7 billion records leaked - here's what we know
China
Chinese hackers develop effective new hacking technique to go after business networks
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business