Subj : Hackers claim to have hit third-part provider for Boeing, Samsung To : All From : TechnologyDaily Date : Fri Oct 03 2025 18:00:10 Hackers claim to have hit third-part provider for Boeing, Samsung and more Date: Fri, 03 Oct 2025 16:45:00 +0000 Description: Dimensional Control Systems files surface on the dark web, but authenticity has not yet been confirmed. FULL STORY ======================================================================J GROUP claims to have stolen 11GB of sensitive data from DCS Cybernews reviewed sample files but couldnt confirm their authenticity DCS has not confirmed or denied the alleged ransomware breach A company building dimensional engineering software for giants such as Siemens and Samsung has allegedly suffered a ransomware attack which saw it lose plenty of sensitive customer data. A ransomware group calling itself J GROUP recently added Dimensional Control Systems (DCS) to its data leak site. JGROUP claims to have stolen 11GB of company data, including sensitive internal documents such as proprietary software architecture and documentation, configuration files for integrations with CAE, HPC, and PLM systems, client-side metadata defining business objects, user permissions, and audit trails, sensitive legal documents, and internal procedures for backups, technical support, and security. How to stay safe DCS is a Michigan-based company specializing in quality and dimensional engineering software for manufacturing industries. Its flagship product, 3DCS Variation Analyst, helps manufacturers simulate and analyze dimensional variation in assemblies before production begins. Its clients working in automotive, aerospace, electronics, and medical device sectors, and include the likes of industry giants such as Boeing, Volkswagen, Siemens, and Samsung. To prove its claims, J GROUP released a .txt file and a compressed folder with samples. Security researchers from Cybernews investigated the samples, and while they determined the documents do contain peoples names and some expense reports, they did not confirm, nor deny, the authenticity of the files. The researchers also stressed that on many occasions, cybercriminals recycle files stolen in previous attacks, to try and monetize them again. At the moment, DCS is keeping quiet. There is no official confirmation, or denial, of the attack. We have reached out to the company and will update the article if we hear back. If these files were indeed stolen, the implications could be serious, and include intellectual property risk, supply chain compromise, client data exposure, as well as legal and regulatory fallout, or operational disruption. The breach could undermine DCSs technical integrity, client trust, and regulatory standing. Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button! And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too. You might also like This devious ransomware is able to hijack your system to turn off antivirus Take a look at our guide to the best authenticator app We've rounded up the best password managers ====================================================================== Link to news story: https://www.techradar.com/pro/security/hackers-claim-to-have-hit-third-part-pr ovider-for-boeing-samsung-and-more --- Mystic BBS v1.12 A49 (Linux/64) * Origin: tqwNet Technology News (1337:1/100) .