Information Security 5 min read

Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses

A recent ransomware group called RansomHouse revealed that AMD suffered a massive data breach of over 450 GB due to employees using simple passwords like "admin" and "123456", highlighting the dangers of weak credentials and prompting urgent security awareness.

IT Services Circle
IT Services Circle
IT Services Circle
Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses

In March, reports surfaced that the Ukrainian armed forces' "Dnipro" military automation control system used a primitive server network protection with the default credentials admin / 123456 , shocking observers with the simplicity of a national‑level defense system's password.

Shortly after, the ransomware group RansomHouse claimed to have infiltrated AMD's network for over six months, stealing more than 450 GB of data on January 5 2022. The breach was attributed to employees using weak passwords such as "admin", "123456", "password", and "Welcome1".

RansomHouse posted evidence of the theft, including timestamps and screenshots, and later issued a puzzle asking readers to guess the compromised company, which was quickly identified as AMD. They emphasized that the breach was not a ransomware attack; instead, the group focused on data theft for resale, considering ransom negotiations a waste of time.

AMD responded only with a statement that an investigation is ongoing. The incident underscores the critical importance of using unique, complex passwords for all systems to prevent large‑scale data loss and financial damage.

Finally, the article advises everyone to set strong, memorable passwords and remain vigilant against phishing and other cyber‑threats.

information securitydata breachAMDransomwareweak passwords
IT Services Circle
Written by

IT Services Circle

Delivering cutting-edge internet insights and practical learning resources. We're a passionate and principled IT media platform.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.