{
	"id": "8d1b0744-6bf9-495f-9080-b83f9762c3dd",
	"created_at": "2026-04-06T03:37:51.903488Z",
	"updated_at": "2026-04-10T13:12:52.307729Z",
	"deleted_at": null,
	"sha1_hash": "4541f2260d1f015aad94b76a4a52f0af5e58fb71",
	"title": "JVCKenwood hit by Conti ransomware claiming theft of 1.5TB data",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2808935,
	"plain_text": "JVCKenwood hit by Conti ransomware claiming theft of 1.5TB data\r\nBy Lawrence Abrams\r\nPublished: 2021-09-30 · Archived: 2026-04-06 03:23:24 UTC\r\nJVCKenwood has suffered a Conti ransomware attack where the threat actors claim to have stolen 1.7 TB of data and are\r\ndemanding a $7 million ransom.\r\nJVCKenwood is a multinational electronics company based out of Japan that employs 16,956 people and has a 2021 revenue\r\nof $2.45 billion. The company is known for its brands JVC, Kenwood, and Victor, which manufacture car and home audio\r\nequipment, healthcare and radio equipment, professional and in-vehicle cameras, and portable power stations.\r\nYesterday, JVCKenwood disclosed that servers belonging to its sales companies in Europe were breached on September\r\n22nd, and the threat actors may have accessed data during the attack.\r\nhttps://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"JVCKENWOOD detected unauthorized access on September 22, 2021 to the servers operated by some of the\r\nJVCKENWOOD Group’s sales companies in Europe. It was found that there was a possibility of information leak by the\r\nthird party who made the unauthorized access,\" JVCKENWOOD announced in a press statement.\r\n\"Currently, a detailed investigation is being conducted by the specialized agency outside the company in collaboration with\r\nthe relevant authorities. No customer data leak has been confirmed at this time. The details will be announced on the\r\ncompany website as soon as they become available.\"\r\nJVCKenwood hit by ransomware\r\nToday, a source shared a ransom note for a CONTI ransomware sample used in the attack against JVCKenwood.\r\nIn a negotiation chat, the ransomware gang claims to have stolen 1.5 TB of files and is demanding $7 million not to publish\r\nthe data and provide a file decryptor.\r\nAs proof that they stole data, the threat actors shared a PDF file indicating it is a scanned passport for a JVCKenwood\r\nemployee.\r\nSince providing proof of data theft, there has been no further contact from the JVCKenwood representative indicating that\r\nthe company will likely not pay a ransom.\r\nConti is a ransomware family believed to be operated by the TrickBot threat actor group and is commonly installed after\r\nnetworks are compromised by the TrickBot, BazarBackdoor, and Anchor trojans.\r\nThe ransomware gang has been responsible for a wide range of attacks over the years, including high-profile attacks against\r\nthe City of Tulsa, Ireland's Health Service Executive (HSE), Advantech, and numerous health care organizations.\r\nMore recently, the Conti gang faced some controversy after a disgruntled affiliate leaked the ransomware operation's attack\r\nplaybook, giving law enforcement and researchers insight into their tactics.\r\nLast week, a joint report between the FBI, CISA, and NSA warned of escalating Conti ransomware attacks.\r\nBleepingComputer has contacted JVCKenwood with questions regarding the attack but has not heard back at this time.\r\nhttps://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/\r\nhttps://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data/"
	],
	"report_names": [
		"jvckenwood-hit-by-conti-ransomware-claiming-theft-of-15tb-data"
	],
	"threat_actors": [],
	"ts_created_at": 1775446671,
	"ts_updated_at": 1775826772,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4541f2260d1f015aad94b76a4a52f0af5e58fb71.pdf",
		"text": "https://archive.orkl.eu/4541f2260d1f015aad94b76a4a52f0af5e58fb71.txt",
		"img": "https://archive.orkl.eu/4541f2260d1f015aad94b76a4a52f0af5e58fb71.jpg"
	}
}