Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Paint giant AkzoNobel reveals data breach, says US site was affected

Code Skull.

  • Ransomware group claims theft of large data archive from AkzoNobel
  • Leaked files include sensitive personal and corporate documents
  • Company confirms incident but emphasizes limited impact

Cybercriminals claimed to have recently broken into AkzoNobel and stole 170GB of data, including user emails, phone numbers, passport scans, and other sensitive data.

Based in the Netherlands, AkzoNobel is a multinational company which is one of the largest paint and coatings manufacturers in the world, whose products are used in homes, buildings, cars, industrial equipment, and elsewhere.

The attack was claimed by a ransomware operator called Anubis, which says it took close to 170,000 files, and leaked samples on its dark web page, which included screenshots of select documents and a file tree.

Limited impact

The published data reportedly contains confidential agreements with high-profile clients, email addresses and phone numbers, email conversations, passport scans, material testing documents, and internal technical spec sheets.

Following the leak, the company confirmed the news and gave more context about the breach:

“AkzoNobel has identified a security incident at one of our sites in the United States. The incident was limited to the respective site and was already contained,” the company told BleepingComputer. “The impact is limited, and we are taking the appropriate steps to notify and support impacted parties and will work closely with relevant authorities.”

It was also said that Anubis leaked only a part of the stolen archives, which could mean that it came to some sort of an arrangement with AkzoNobel. The company did not say if it spoke to the attackers or not.

Anubis is a relatively new Ransomware-as-a-Service (RaaS) operation, which came into the spotlight last summer when it added a new feature to its encryptor that irreversibly destroys all encrypted files on the compromised system.

When the threat actors activate the feature, the wiper erases the contents of the files and reduces their size to 0 KB. The filenames and the structure remain intact, which means it’s impossible to recover the files.


Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.