Greetings, 

Dear Readers! 

“Your Legal-Tech Brew!” is a blog as cliché as any other blog…. It is an honest attempt towards compiling recent news in cyber-legal space, for the readers to understand right from the basic terminologies to analyzing existing legal framework across dimensions of cyberspace through various brief posts. 
(The content of the blog is original work of the author, due credits have been given for the content referred from different sources. The blog is for information purpose only.)


🖧 Post 3/2025News Update- Ransomware attack on
Tata Technologies.

A subsidiary of Tata Motors, Tata
Technologies is an Indian public multinational tech firm that focuses on
automotive design, aerospace engineering, and R&D engineering in general.

Tata Tech in a notification to National
Stock Exchange notified that a ransomware has temporarily affected some of the data/ IT
assets. This attack was reportedly carried out in January 2025

The public notice issued by Tata
Tech intimates about Cyber Security Incident. (Image of the public notice is attached below.)




A ransomware group known as
Hunters International added Tata to their Tor-based leak site, claiming to have
stolen over 730,000 files and threatening to make all the data public within
the next six days.[1]

(This notorious group has targeted
organizations working in sectors of automotive, financial, manufacturing, etc. One
of the major targets of this group was the U.S. Navy Contractor ‘Austal USA’)

With no further updates have been
shared by the company for over a month, Hunters International added an entry of
Tata Technologies on its extortion page on the dark web, claiming
responsibility for the attack. The threat actors claim to have stolen 1.4TB of
data from Tata Technologies, consisting of 730,000 files. The ransomware gang
threatens to release the stolen files in exactly one week if a ransom
demand is not met.[2]

What is a ransomware attack?

Ransomware is a type of malware. It
holds the target’s data as hostage and threatens to keep it locked unless a ‘ransom’
amount is paid to the attacker.

During earlier times, which
technological advancements were not at their peak, the ransomware attacks were
simple- a ransom in exchange of an encryption key that is used for regaining of
the hostage data/infected data/device.

One of the major reasons of data
breach is a ransomware attack. Some statistics by IBM regarding the ransomware
attacks are as follows:

  • ·      
    20% of all cyberattacks recorded by
    the IBM® X-Force® Threat Intelligence Index in 2023
    involved ransomware. And these attacks move quickly. When hackers gain
    access to a network, it takes less than four days to deploy ransomware.
  • ·       According to the IBM Cost of a Data
    Breach
     report, the average cost of a ransomware breach is USD
    5.68 million, which does not include ransom payments.

Common methods of deploying a
ransomware includes-

Phishing, social
engineering techniques
, software vulnerabilities, Drive-by-downloads
(showing malwares as legitimate so that the user downloads it and the ransomware
gets injected into the device.), Ransomware-as-a-service (RaaS) is one of the
major deployed technique (the ransomware developers share the malware code with
the cybercriminals).

Process of Injecting a ransomware-

Initial Access through Phishing/software vulnerabilities, etc. 🠖 Deploying an intermediary access tool so as to gain the hold of the target device 🠖 Lateral Movement where the attackers start gaining access to systems and domains 🠖 Data Collection where the attackers identify the valuable data 🠖 Backing up the target’s data and the ask for a Ransom.

📎

(The blog and content therein including the figures, is an original work of the author, using the content without prior permission from the author is not encouraged.)


Leave a comment

This is a blog aiming to provide its readers with basic legal-tech knowledge that is necessary in the current times.

The author (www.linkedin.com/in/adv-annanya-deshpande) is a cyber law enthusiast and a keen researcher on the theme of Cyber Law and Artificial Intelligence. She aims to share the basic knowledge of the legal-tech world to the commoners and also the professionals.

The Blog post provides with short/brief reads, regarding the ongoing trends, Statutory viewpoints, the tussle between practicality and the letter of law, while also explaining the basic terms used in the field of AI and technology.

The author is always open to constructive criticism and feedback. Collaborations are welcomed! Any insight can be communicated via the feedback form/ LinkedIn.