Anatomy of a Breach

Anatomy of a Breach: Western Digital — My Cloud Offline for Two Weeks and 10TB of Internal Data Stolen

> series: anatomy_of_a_breach —— part: 172 —— target: western_digital —— data_stolen: 10TB —— my_cloud: offline_2_weeks<span class="cursor-blink">_</span>_

Hedgehog Security 30 April 2023 12 min read

A data storage company. 10TB stolen. My Cloud offline for two weeks. The irony writes itself.

On 3 April 2023, Western Digital disclosed that an unauthorised party had gained access to its internal systems and obtained data. The company took its My Cloud consumer cloud storage platform offline as a precautionary measure — locking millions of users out of their own files, photos, and backups for approximately two weeks. The attackers claimed to have stolen approximately 10 terabytes of internal data.

The group behind the attack — associated with the ALPHV/BlackCat ransomware operation — published evidence of their access including screenshots of internal videoconferences, SAP backend systems, and executive emails. They demanded a 'minimum 8 figure' ransom and threatened to publish the stolen data. Western Digital did not pay. The breach was particularly embarrassing for a company whose core business is data storage and protection — joining the pattern of security and infrastructure vendors breached throughout this series: RSA, LastPass, Imperva, NordVPN, and now Western Digital.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

My Cloud offline. Users could not access their own data. For two weeks.

Cloud Dependency Risk
Millions of My Cloud users discovered that 'their' cloud data was accessible only when Western Digital's systems were operational. The two-week outage highlighted cloud dependency risk — when your cloud provider is breached or disrupted, your data is inaccessible. <a href="/penetration-testing/cloud-configuration-review">Cloud configuration reviews</a> assess cloud dependency and data portability.
The Storage Company Could Not Protect Its Own Data
Western Digital's entire business is storing and protecting data — yet it could not protect its own internal systems from a 10TB theft. Like <a href="/blog/anatomy-of-a-breach-hbgary-federal">HBGary Federal</a> and <a href="/blog/anatomy-of-a-breach-imperva">Imperva</a>, the breach proved that domain expertise does not confer defensive immunity. Our <a href="/penetration-testing">penetration testing</a> verifies security regardless of the organisation's claimed expertise.
Internal Communications Exposed
Videoconference screenshots and internal emails were published — continuing the pattern from <a href="/blog/anatomy-of-a-breach-sony-pictures">Sony Pictures</a> (2014), the <a href="/blog/anatomy-of-a-breach-dnc-hack">DNC</a> (2016), and <a href="/blog/anatomy-of-a-breach-hbo-hack">HBO</a> (2017): internal communications, once stolen, are invariably weaponised for embarrassment and leverage.
ALPHV/BlackCat: Sophisticated Ransomware Operation
ALPHV/BlackCat was one of the most active ransomware-as-a-service operations of 2022-2023, known for targeting high-profile organisations and using advanced extortion techniques. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for ALPHV/BlackCat indicators. <a href="https://www.cyber-defence.io/services/threat-intelligence">UK Cyber Defence</a> tracks ransomware group operations.

Your data's safety depends on your provider's security. Not their brand.

Western Digital's breach proved that a company's brand, reputation, and domain expertise do not guarantee its security. For UK organisations selecting cloud storage, backup, and data management providers, the provider's actual security posture — verified through testing and auditing, not marketing — must be the basis of trust. Cyber Essentials of providers demonstrates baseline security. Our penetration testing verifies actual security. SOC in a Box monitors for the anomalous activity that indicates vendor compromise. And UK Cyber Defence provides incident response when storage and backup providers are breached.


Western Digital — a data storage company — had 10TB stolen. Is your data provider tested?

<a href="/penetration-testing">Penetration testing</a> verifies provider security. <a href="/cyber-essentials">Cyber Essentials</a> certifies the baseline. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for provider compromise.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles