LG battery subsidiary says ransomware attack targeted overseas facility

One of the world’s largest battery makers confirmed it was affected by ransomware following claims made by a cybercriminal gang that the FBI spotlighted last week.

A spokesperson for South Korea-based LG Energy Solution said the company recently identified an attack and is currently implementing security measures to address the situation. 

“The attack targeted a specific overseas facility, and we have confirmed that the headquarters and other facilities were not affected,” the spokesperson said. The company has facilities on multiple continents, including eight in North America.

“The impacted facility is now operating normally after the recovery measures were taken, and we are conducting security operations and investigations as a precautionary measure.”

The spokesperson did not respond to further questions about the nature of the incident. 

LG Energy Solution is a subsidiary of Korean multinational LG and earned $17.5 billion in 2024 through its work supplying batteries to car makers. 

On Monday, the Akira ransomware gang added the company to its leak site, claiming to have stolen 1.7 terabytes of data that included corporate documents, databases of employee information and more. 

On November 13, the FBI released an updated notice on the ransomware gang, warning that the hackers are believed to have claimed more than $244 million in ransomware proceeds.

“Akira ransomware doesn’t just steal money – it disrupts the systems that power our hospitals, schools, and businesses,” said FBI Cyber Division Assistant Director Brett Leatherman.

The advisory warned that the group was targeting manufacturing companies and several other industries. 

The evolving prominence of battery manufacturers has made them targets for ransomware gangs. German battery manufacturer Varta AG was knocked offline for weeks by a cyberattack last year.

Hackers stole $60 million from one of the leading suppliers of a key material used to make batteries in 2024.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says

Next Post

Fortinet Warns of New FortiWeb CVE-2025-58034 Vulnerability Exploited in the Wild

Related Posts

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The operator also used several ChatGPT accounts to
Read More

Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Cisco has warned of a high-severity security flaw in IOS Software and IOS XE Software that could allow a remote attacker to execute arbitrary code or trigger a denial-of-service (DoS) condition under specific circumstances. The company said the vulnerability, CVE-2025-20352 (CVSS score: 7.7), has been exploited in the wild, adding it became aware of it "after local Administrator credentials were
Read More

EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates

The threat actor known as PlushDaemon has been observed using a previously undocumented Go-based network backdoor codenamed EdgeStepper to facilitate adversary-in-the-middle (AitM) attacks. EdgeStepper "redirects all DNS queries to an external, malicious hijacking node, effectively rerouting the traffic from legitimate infrastructure used for software updates to attacker-controlled infrastructure
Read More