KLA Corporation Hit by Meow Ransomware in Major Cyber Attack

Incident Date:

August 7, 2024

World map

Overview

Title

KLA Corporation Hit by Meow Ransomware in Major Cyber Attack

Victim

KLA

Attacker

Meow

Location

Milpitas, USA

California, USA

First Reported

August 7, 2024

Ransomware Attack on KLA by Meow Ransomware Group

On August 7, 2024, KLA Corporation, a global leader in process control and yield management for the semiconductor industry, discovered it had fallen victim to a ransomware attack orchestrated by the Meow ransomware group. This incident has raised significant concerns within the cybersecurity community, given KLA's pivotal role in the electronics manufacturing sector.

About KLA Corporation

KLA Corporation, headquartered in Milpitas, California, is a prominent player in the semiconductor industry, specializing in advanced inspection tools, metrology systems, and data analytics solutions. The company employs over 15,000 people globally and reported a revenue of approximately $9.7 billion for the fiscal year 2023. KLA's technologies are integral to the production of semiconductor devices used in smartphones, laptops, and various smart devices, making it a cornerstone of modern electronics manufacturing.

Attack Overview

The ransomware attack was discovered on August 7, 2024, and was claimed by the Meow ransomware group via their dark web leak site. The extent of the data breach is still under assessment, and the size of the data leak remains unknown. KLA is currently working to determine the full impact of the attack on its operations and data security.

About Meow Ransomware Group

Meow Ransomware emerged in late 2022 and resurfaced in 2024 with a series of high-profile attacks. The group is associated with the Conti v2 ransomware variant and primarily targets organizations in the United States. Meow Ransomware employs various infection methods, including phishing emails, exploit kits, and Remote Desktop Protocol (RDP) vulnerabilities. Once a system is compromised, the ransomware encrypts files using a combination of the ChaCha20 and RSA-4096 algorithms.

Potential Vulnerabilities

KLA's extensive global operations and its critical role in the semiconductor supply chain make it an attractive target for ransomware groups like Meow. The company's reliance on advanced data analytics and interconnected systems could have provided multiple entry points for the attackers. Additionally, the high value of the data handled by KLA, including proprietary technologies and client information, increases the potential impact of such an attack.

Penetration Methods

Meow Ransomware likely penetrated KLA's systems through one of several common vectors, such as phishing emails or exploiting vulnerabilities in remote access protocols. The group's use of sophisticated encryption algorithms and their strategy of posting victim data on their leak site if the ransom is not paid underscores the severity of the threat they pose.

Sources

Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.