Skip to main content

Canon reportedly targeted by ransomware cyberattack

Canon was reportedly hit by a ransomware attack that impacted emails, cloud photo and video storage, and other services. 

The attack resulted in 10TB of data stolen, according to Bleeping Computer. Customers who use Canon’s free 10GB storage feature may have been affected by this alleged attack. Canon’s email, Microsoft Teams, U.S. website, and other private databases were also reportedly affected. 

A Canon spokesperson told Digital Trends the company was “currently investigating the situation.” An official announcement to customers about the incident says that data was lost, but declines to call it a cyberattack or that the data was leaked.

Canon EOS R5 product photo
Daven Mathies/Digital Trends

“We identified that some of the photo and video image files saved in the 10GB long-term storage prior to June 16, 2020, 9 a.m. (JST) were lost. We confirmed that the still image thumbnails of the affected files were not affected, and there was no leak of image data,” Canon said in their announcement “After having resolved the issue that resulted in the loss of the photo and video image files, we resumed the image.canon service as of August 4, 2020.”

There are still issues with the 10GB storage feature, and users will get an error message if they try to download or transfer a still image thumbnail file. Canon said it’s looking into fixing the problem. 

Bleeping Computer reports that Maze is responsible for the cyberattack and will publish the stolen data if they do not receive their ransom amount. Maze ransomware is responsible for past cyberattacks on LG, Xerox, Cognizant, and other high-profile companies. 

It’s the second major ransomware attack reported in the last week after Garmin was targeted by attackers who used the WastedLocker ransomware. Those attackers reportedly demanded $10 million. 

Editors' Recommendations

Allison Matyus
Former Digital Trends Contributor
Allison Matyus is a general news reporter at Digital Trends. She covers any and all tech news, including issues around social…
GPUs could become Trojan horses for future cyberattacks
nvidia ampere gpu could destroy xbox series x rtx 2080 super review feature

The graphics card inside your computer is a powerful tool for gaming and creative work, but it can also potentially serve as a Trojan horse for malware. Cybercriminals are finding ways to exploit graphics cards and their VRAM to inject malicious code into your system. The approach is claimed to have worked during a proof-of-concept hack on both discrete and integrated GPUs from AMD, Intel, and Nvidia.

Because antivirus software today cannot scan the graphics card's own video RAM, known as VRAM, hackers are now targeting GPUs to carry out their dirty work. On the other hand, conventional methods used today that target the system's main memory would trigger the antivirus software.

Read more
Protect your email now against the return of this nasty ransomware botnet
A botnet controls multiple computers as this illustration shows.

The infamous Trickbot ransomware botnet is on the rise, according to reports from multiple security research firms.

After being dismantled in a joint effort by Microsoft and the Pentagon, the Russian-speaking group of cybercriminals is spreading its malicious software once again, and security research firms are classifying it as a "critical" threat.

Read more
This Windows 10 trick gives your PC built-in ransomware protection
microsoft surface laptop 4 vs 3 microsoftsurfacelaptop3 10 1500x1000

Ransomware is quite dangerous, as hackers use it to hold your important files hostage until you pay them a high price. There are many ways to protect yourself against this, but it turns out that Windows 10 has a trick that can allow you to turn on built-in ransomware protection in just a few clicks.

The trick involves just going to your Windows 10 Start Menu and searching for "ransomware protection," as discovered by PCGamesSN. This will then prompt you to open up the Ransomware protection page in Windows Security. From here, you're able to toggle a switch for Controlled folder access.

Read more