{
	"id": "1a6da18c-4e23-4404-8697-391d7ced5408",
	"created_at": "2026-04-06T00:15:20.730779Z",
	"updated_at": "2026-04-10T03:20:16.672912Z",
	"deleted_at": null,
	"sha1_hash": "ff8d898b3f64457e5e048301bc9dc32ec1c366b4",
	"title": "Kyocera AVX says ransomware attack impacted 39,000 individuals",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3773773,
	"plain_text": "Kyocera AVX says ransomware attack impacted 39,000 individuals\r\nBy Bill Toulas\r\nPublished: 2023-11-09 · Archived: 2026-04-05 15:06:12 UTC\r\nKyocera AVX Components Corporation (KAVX) is sending notices of a data breach exposing personal information of\r\n39,111 individuals following a ransomware attack.\r\nKAVX is an American manufacturer of advanced electronic components, a subsidiary of the Japanese semiconductor giant\r\nKyocera. It employs over ten thousand specialists and has an annual revenue of $1.3 billion.\r\nIn the data breach notification to affected people, KAVX says that it discovered on October 10, 2023 that hackers accessed\r\nits systems between February16, and March 30, 2023.\r\nhttps://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n“On March 30, 2023, KAVX experienced a cybersecurity incident affecting servers located in Greenville and Myrtle Beach,\r\nSouth Carolina, USA, which resulted in the encryption of a limited number of systems and temporary disruption of certain\r\nservices,” reads the notice.\r\n“KAVX later discovered that the data contained on the impacted servers included personal information of individuals\r\nglobally,” the company notes.\r\nFollowing an internal investigation to determine what information was exposed, KAVX confirms that it includes at least full\r\nnames and Social Security Numbers (SSNs). Possibly, more details were exposed, but the relevant section on the notice\r\nsample is censored.\r\nKAVX says it has no evidence that the cyber-criminals abused the stolen data but reminds the letter recipients of the\r\nassociated risk of identity theft and fraud, urging them to be cautious.\r\nIn response to the situation, the company will also cover the costs for a 12-month dark web monitoring and password leak\r\nservice for all impacted individuals.\r\nLockBit claimed responsibility\r\nThe LockBit ransomware gang claimed to have compromised KAVX on May 26, 2023, when it added the firm to its data\r\nleak site.\r\nKAVX on the LockBit extortion portal (KELA)\r\nThe threat actors published several samples of the stolen data on their extortion portal, including passport scans, financial\r\ndocuments, non-disclosure agreements, and more. The deadline that the hackers had set for KAVX to pay the ransom was\r\nJune 9, 2023.\r\nNotably, LockBit also leaked component schematics and technical drawings, meaning that the incident has the potential to\r\nexpose proprietary designs and patented information to competitors.\r\nhttps://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/\r\nhttps://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/"
	],
	"report_names": [
		"kyocera-avx-says-ransomware-attack-impacted-39-000-individuals"
	],
	"threat_actors": [],
	"ts_created_at": 1775434520,
	"ts_updated_at": 1775791216,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/ff8d898b3f64457e5e048301bc9dc32ec1c366b4.pdf",
		"text": "https://archive.orkl.eu/ff8d898b3f64457e5e048301bc9dc32ec1c366b4.txt",
		"img": "https://archive.orkl.eu/ff8d898b3f64457e5e048301bc9dc32ec1c366b4.jpg"
	}
}