DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

“You really don’t understand the situation…. Google about our team,” Hive tells victim

Posted on June 29, 2022 by Dissent

SuperAlloy Industrial Company Ltd. (SAI) is an international company specializing in engineering and manufacturing lightweight metal products predominantly for the automotive industry. You  may not recognize their name but might be driving around on their wheels, as SAI has produced lightweight forged aluminum wheels for McLaren, Ferrari, AMG, BMW, Jaguar, Daimler, and other manufacturers.

SAI is headquartered in Taiwan, but also has offices in the U.S., U.K., Germany, and Netherlands.

Yesterday, the Hive ransomware team added SAI’s name to their leak site, claiming that they encrypted SAI’s servers on June 21. The claim was accompanied by a file tree and a warning that SAI had three days to get in touch or Hive would disclose the firm’s data.

Hive added SAI to their leak site on June 28. They uploaded a file tree as their own evidence to support their claim at this point. 

Applying Pressure

Hive shared their email chain with SAI with DataBreaches. The email provides some insight into Hive’s approach to pressuring its victims into paying and the extent to which they research their victims in order to apply specific pressure points. In this case, Hive has not emphasized the possible impact of any encrypted servers but appears to focus on the reputational harm, regulatory obligations, client and partner anger, and other negative consequences of any leak of what they claim is more than 1.5 TB of SAI’s data.  In chronological order, Hive’s emails:

June 21, the same day that the servers were encrypted:

! ! ! DO NOT TRY TO DECRYPT OR CHANGE ENCRYPTED FILES ON YOUR COMPUTERS, IT WILL COMPLETELY DESTROY THEM ! ! !

Ladies and gentlemen! Attention, please! Your network has been breached!

We infiltrated your network and stayed there for 21 days (it was enough to
study all your documentation and gain access to your files and services),
encrypted your servers.

Downloaded most important information with a total size over 1.51 Tb

Few details about information we have downloaded:

– contracts, nda and other agreements documents

– your company private info:

-budgets
-plans
-investments
-company bank statements
-other sensitive information

– your customers companies info:

-contracts
-development files
-agreements
-emails
-contacts for “third party data leaks reports”
-nda’s
-other private information

– blueprints
– development files
– material tests and upgrades
– assembly documentation
– other private information

We studied your contracts and agreements carefully, and found out that sum of fines for data leak from your customers and partners will be much higher than the ransome price we offering you to pay.

You can find a file named “HOW_TO_DECRYPT.TXT” which contains instructions about how to contact us and return your files.

We offering you to enter into negotiations with us as soon is possible.

Please, do not forget that after the publication of this, you should expect court fines, both from your clients and from the regulator, and also a huge business reputation loss, with police investigation into your business. We also noticed that one of your board members is a Minister of Justice of the Republic of China aka Morley Shih Shih Mao-lin. We guess this situation will be extremely uncomfortable for this person.

IF YOU WILL REFUSE TO GET IN TOUCH WITH US WITH THE INSTRUCTIONS WE PROVIDED TO YOU WE WILL BE FORCED TO POST ALL YOUR DATA FOR FREE DOWNLOAD

Have a nice day.

! ! ! DO NOT TRY TO DECRYPT OR CHANGE ENCRYPTED FILES ON YOUR COMPUTERS, IT WILL COMPLETELY DESTROY THEM ! ! !

[Comment by DataBreaches: Morley Shih was Minister of Justice of the Republic of China in 2005-2008 but is not a minister at the present time. But if he was currently a Minister of Justice, wouldn’t that be more likely to result in a recommendation for the firm not to pay extortion?]

June 23, Hive emailed SAI again:

Good day. We noticed that you have read our messages but did not answer. Well, this is a bit sad since you have Annual Meeting scheduled 2022.06.27 09:00 AM. We offering you once again to negotiate with us. If you refuse to answer us again before this meeting, we will inform following contacts about your data loss:

– GreTai Securities Market
– Mega Securities, your stock agent
– investors
– government regulators
– social mass medias, FB IG WEIBO
– customers

Once again, ransom price we offering you to pay is much less then fines and huge reputation loss, minding the fact that your shares are trading on
taiwan stock market under code 1563.

June 24, Hive emailed SAI again:

You really don’t understand the situation.

We are a large and well-to-do team. Our turnover for the last year exceeded $300M.

We have thoroughly studied your company as well as financial documents. And we estimated the losses that the company will incur if all downloaded data is published.

Firstly, we will send all your employees and clients instructions on where
and why they should contact in connection with the leak of their personal
data.

Secondly, since you have not officially announced the leakage of personal
data, we will inform the regulator. And you will be fined accordingly.

Thirdly, from your databases we will collect the email addresses of all your partners and also notify them that you do not know how to keep confidential information.

Continue further? I think even these 3 points can ruin your business
forever. A business reputation is earned over the years and it can be lost
in a matter of hours

[Hive’s onion URL redacted by DataBreaches]
Google about our team.

June 28, after listing SAI on their leak site, Hive sent one more email addressed to five SAI executives:

We have disclosed you on our website.
[Onion link redacted by DataBreaches.net]

But you still have time till July 4th to make an agreement with us and stop data leak.

DataBreaches submitted an inquiry to SAI yesterday morning but received no reply.
When asked if Hive received any replies at all from SAI, Hive’s spokesperson informed DataBreaches that someone from SAI did show up in chat and found out how much ransom was being demanded. Since then, there has reportedly been no contact or response by the firm.

This post will be updated when more information becomes available.

Category: Breach IncidentsBusiness SectorCommentaries and AnalysesMalwareNon-U.S.

Post navigation

← StockX LLC Data Breach Canadian Class Action Pre-Approval Notice of Canadian Settlement Approval Hearing
When the data leak is not from the victim you named, Wednesday edition →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.