Swiss manufacturer investigating ransomware attack that shut down IT network

Avatar

Hackers are attempting to blackmail a Swiss manufacturing giant after a cyberattack on Friday.

Schlatter Group did not respond to questions about the incident, but said in a press release that it was dealing with a “criminal cyberattack using malware.”

The company — which is more than 100 years old and specializes in plant engineering as well as welding — immediately initiated security measures and involved law enforcement when the attack was discovered on Friday.

Schlatter Group currently does not have access to its email system and urged customers to call them if there are any issues. As part of the investigation, the company is assessing whether data was stolen. 

“It can be assumed that this was a professional attack. The unknown perpetrators are attempting to blackmail Schlatter. The ICT experts are working intensively to make all systems available and functional again as quickly as possible,” the company explained. 

No ransomware gang or hacking group has taken credit for the attack as of Monday afternoon. 

The company is deeply involved in the automation of production systems, offering customers plant engineering services for resistance welding systems as well as weaving and finishing equipment for the production of paper machine clothing, wire fabrics and wire mesh.

It reported nearly $150 million in sales over the last fiscal year. 

Swiss authorities in June said they saw an increase in cyberattacks ahead of a Ukraine peace summit and the country’s president is frequently criticized in Russian media.

Last year, Swiss technology conglomerate ABB was hit with a ransomware attack launched by a cybercriminal gang with deep ties in Russia.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Feds seize Radar/Dispossessor ransomware gang servers in US and Europe

Next Post

Ukraine Warns of New Phishing Campaign Targeting Government Computers

Related Posts

Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool

Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform that could be exploited to achieve remote code execution. Tracked as CVE-2024-37032, the vulnerability has been codenamed Probllama by cloud security firm Wiz. Following responsible disclosure on May 5, 2024, the issue was addressed in version
Avatar
Read More

New Zero-Day Flaw in Apache OFBiz ERP Allows Remote Code Execution

A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source enterprise resource planning (ERP) system that could allow threat actors to achieve remote code execution on affected instances. Tracked as CVE-2024-38856, the flaw has a CVSS score of 9.8 out of a maximum of 10.0. It affects Apache OFBiz versions prior to 18.12.15. "The
Avatar
Read More