Topics
up-to-the-minute
AI
Amazon
Image Credits:Jagmeet Singh / TechCrunch
Apps
Biotech & Health
mood
Image Credits:Jagmeet Singh / TechCrunch
Cloud Computing
Commerce
Crypto
Enterprise
EVs
Fintech
fundraise
Gadgets
punt
Government & Policy
computer hardware
Layoffs
Media & Entertainment
Meta
Microsoft
Privacy
Robotics
security measures
societal
Space
startup
TikTok
Transportation
Venture
More from TechCrunch
result
Startup Battlefield
StrictlyVC
Podcasts
Videos
Partner Content
TechCrunch Brand Studio
Crunchboard
reach Us
A hacker claims to be selling datum relating to K of current and former employee of the Indian conglomerate Piramal Group , a multinational company that operates across pharma , financial services and literal land . Piramal repel claims that its systems were breached and said the information came from a third party .
In a listing on a sleep together cybercrime forum last week seen by TechCrunch , the pseudonymous threat actor print a humble portion of the allegedly steal Piramal data for an undisclosed amount . The data point sample distribution let in full names and email address .
The allegedly stolen data could be a boon for cybercriminals by using the info for point employees with cyberattacks .
Piramal Group has over 10,000 employee and 21 various nationality working from its offices in over 30 country worldwide , according to its website . The Mumbai - headquarter companionship also has a brand mien across over 100 markets globally . Piramal operates multiple subsidiaries , include the non - banking financial company Piramal Enterprises , pharmaceutical firm Piramal Pharma , health care company Piramal Healthcare , and real the three estates development branch Piramal Realty .
TechCrunch receive a larger sample of data from the threat actor comprise over 10,000 entries . TechCrunch validated some of the entries using a line listing portal and found them related to current and former employees of the Native American company .
Piramal denied a information breach on its system when TechCrunch give out on Tuesday with a sample of the data point share by the menace worker . The caller propose that the datum could be sourced from a third company .
“ After conducting a thorough probe , we can confirm that there has been no data point breach incident at Piramal Group . Our IT and cybersecurity teams have rigorously examined our systems , and there is no grounds to support the claim that any selective information or files of this nature exist on our servers . Additionally , the sample distribution data does not let in any Piramal info such as employee electronic mail I.D. , and it appears to originate from a third - company program , ” said Piramal spokesperson Mihir Mukherjee in an emailed statement .
Join us at TechCrunch Sessions: AI
Exhibit at TechCrunch Sessions: AI
Piramal afterwards contacted TechCrunch to say that it determined that the information came from Mailinator , a platform for examination email and SMS workflows . Mailinator did not immediately respond to a request for remark .
When ask by TechCrunch , Piramal ’s spokesperson refused to say how the company determined that it had not experienced a data breach , such as whether Piramal has the technical means to detect data point exfiltration .
Piramal also tell TechCrunch that it received a query on the data breach incident from India ’s computer emergency reply team , live as CERT - In .
“ After a thorough investigation , we confirmed [ to ] CERT - In that no such data breach incident has occurred on our system , and no entropy is compromised , ” the spokesperson said .
Updated with further comment from Piramal .