Connect with us

Hi, what are you looking for?

Tech & Science

Acer hit by second cyberattack in one week

Once is unfortunate, twice is clumsy. Computer company Acer stumbles again under a cyberattack.

Acer Building in New Taipei, Taiwan. Image by Solomon203 - CC BY-SA 3.0
Acer Building in New Taipei, Taiwan. Image by Solomon203 - CC BY-SA 3.0

Acer, a Taiwanese advanced electronics technology company, has been hit by a second cyberattack this week, bringing the total to at least three this year afflicting the company. When back-to-back attacks like this occur, it raises the question of whether or not they are truly separate or a continuation of one another.

In this case, the Desorden Group has claimed responsibility for both of the most recent attacks. A relatively new hacker group, Desorden Group recently claimed to have hacked into the Malaysian servers of ABX Express Enterprise.

“Upon detection, we immediately initiated our security protocols and conducted a full scan of our systems,” an Acer spokesperson is reported by ZDNet.

The statement continues: “We are notifying all potentially affected customers in India. The incident has been reported to local law enforcement and the Indian Computer Emergency Response Team, and has no material impact to our operations and business continuity.”

Pondering over the attacks, Nick Tausek, Security Solutions Architect at Swimlane, finds: “Enterprises affected by frequent cyberattacks not only have compromised and exposed data to consider, but also the overarching success of their businesses.”

However,  Tausek, reminds us: “When critical servers and IT infrastructures are repeatedly forced offline, day-to-day operations are significantly impacted: The average cost of IT downtime is $5,600 per minute.”

In terms of counter actions, Tausek recommends: “To prevent recurring attacks, it is important for companies to take a look at IT ecosystems in their entirety, not just infected servers or databases.”

With other measures, Tausek puts forwards: “Additionally, companies must take the proper course of action to ensure that valuable data, such as the employee details compromised in this attack, is protected.”

Splicing these recommendations together, Tausek establishes: “Organizations must implement robust, multi-faceted cybersecurity platforms that automate detection, response and investigation protocols. With comprehensive security automation, security teams are allowed full visibility into IT systems and can properly detect and respond to threats in real-time.”

This means that: “Security-related tasks can be carried out in an infinitely more dependable manner, ultimately keeping valuable data safe and ensuring crucial businesses continue to run smoothly.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:


Once part of a botnet, their devices can be used to launch attacks without their knowledge, potentially making them liable for criminal charges.


Democracy happens to be the only form of government you can actually do anything about. If it goes, you have no options.


Pro-Palestinian demonstrators blocked San Francisco's Golden Gate Bridge.

Tech & Science

When IoT devices run on outdated firmware or do not get updated regularly, they become easy targets for cybercriminals.