Industrial tech manufacturer Sensata says ransomware attack is impacting production

Avatar

A ransomware attack on Massachusetts-based manufacturer Sensata Technologies last weekend has seriously disrupted the company’s systems.

The company, which has sites in about a dozen countries, notified the U.S. Securities and Exchange Commission (SEC) of the incident on Wednesday, warning investors that the ransomware attack forced officials to take its network offline. 

The incident began on Sunday and prompted the company to contact law enforcement.

“The incident has temporarily impacted Sensata’s operations, including shipping, receiving, manufacturing production, and various other support functions. While the Company has implemented interim measures to allow for the restoration of certain functions, the timeline for a full restoration is not yet known,” the company said in its 8-K filing. 

“The preliminary investigation has identified evidence that files were taken from the Company’s environment,” the company said.

Sensata, which reported nearly $4 billion in revenue in the last fiscal year, is an industrial technology company with more than 19,000 employees — producing sensors, electrical protection components and other tools for automotive, heavy vehicle and off-road, industrial, and aerospace markets.

Cybersecurity experts are assisting with the recovery effort, Sensata said, and they are working to identify the files that were stolen so that people can be notified of any personal information accessed. 

Sensata said it does not believe the attack will have a material impact on the company’s financial status for the current quarter but noted that this may change based on the outcome of the recovery. 

The company ships about 1 billion units of product each year. It’s best known for its work designing panel control switches for the Apollo 11 moon mission and for helping upgrade the Hubble space telescope.

No ransomware gang has taken credit for the incident as of Wednesday evening.

IndustryCybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Rights group calls on Thai government to end alleged cyberattacks against civil society

Next Post

AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections

Related Posts

North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android surveillance tool named KoSpy targeting Korean and English-speaking users. Lookout, which shared details of the malware campaign, said the earliest versions date back to March 2022. The most recent samples were flagged in March 2024. It's not clear how successful these efforts were. "
Avatar
Read More

Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks

Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in "extremely sophisticated" attacks. The vulnerability has been assigned the CVE identifier CVE-2025-24201 and is rooted in the WebKit web browser engine component. It has been described as an out-of-bounds write issue that could allow an attacker to craft malicious web content such that it
Avatar
Read More