Excerpt from HackRead Article, Published on Mar 06, 2025.

Tata Technologies has become the latest victim of a ransomware attack, with the notorious Hunters International group claiming responsibility. The attackers assert that they have exfiltrated 1.4 terabytes of data, containing over 730,000 files, and are threatening to leak the stolen information unless a ransom is paid. The incident has raised serious cybersecurity concerns, especially given Tata Technologies’ role as a leading engineering and IT services provider. The attack follows a January 2025 disclosure by Tata Motors, which confirmed a ransomware incident affecting some of its IT services. While Tata Technologies acknowledged the breach at the time, the company did not disclose the extent of the damage or the identity of the attackers. Now, Hunters International has stepped forward, intensifying pressure on Tata Technologies. The ransom amount demanded by the attackers has not been publicly revealed, and Tata Technologies has not commented on whether they are in negotiations.

Hunters International is a well-known ransomware gang that has targeted high-value organizations across various industries, including automotive and finance. Some experts speculate that this group may be a rebranded version of the Hive ransomware gang, which was dismantled in 2023 through a joint operation by the FBI and European law enforcement agencies. The connection between the two groups is strengthened by the fact that Hive had previously attacked Tata Power in 2022, leaking stolen data after ransom negotiations failed.

The attack on Tata Technologies underscores the increasing vulnerability of major corporations to sophisticated cyber threats. Camellia Chan, CEO of X-PHY, highlighted that the industrial sector faced the most cyberattacks in 2024, and Tata Technologies’ breach exemplifies the ongoing risk. She emphasized the need for AI-driven, multi-layered defense strategies to combat such threats effectively. The situation remains unresolved, leaving Tata Technologies to navigate the challenge of securing its data while determining its next steps against the ransomware group.

To delve deeper into this topic, please read the full article HackRead.