Home appliance company Presto says cyberattack causing delivery delays

Avatar

A company that produces widely sold air fryers and pressure cookers said a cyberattack was hampering its shipping and manufacturing processes. 

National Presto Industries — the company behind the Presto brand of home appliances — filed notices with the U.S. Securities and Exchange Commission (SEC) on Thursday evening warning that it is experiencing a system outage caused by a cybersecurity incident that began on March 1.

“The incident has temporarily impacted the Registrant’s operations, including shipping and receiving, some manufacturing processes, and various other back office functions, much of which are in the process of being restored. The Registrant has implemented temporary measures to maintain critical functions while systems are being restored,” the Wisconsin-based company explained.

Law enforcement has been notified and an incident response team of both internal and outside cybersecurity experts has been activated. 

The company did not respond to requests for comment but said in the SEC filing that it is conducting a forensic analysis to determine the scope of the incident. 

National Presto Industries operates three separate business segments: its home appliance products, ranging from pressure cookers to waffle makers and air fryers; a set of subsidiaries that contract with the U.S. military; and a safety department that makes carbon monoxide detectors, fire alarms and fire extinguishers. 

The SEC filing did not specify if the military contractors — several subsidiaries under the National Defense Corporation umbrella — were affected by the incident. National Defense Corporation did not respond to a request for comment. 

National Presto Industries reported two weeks ago that net 2024 consolidated sales increased to $388.2 million, driven largely by its defense segment.

In the SEC filing, the copany said it has or will notify any relevant federal and state regulatory bodies or agencies. 

The company warned that the incident “could have the potential to have a material impact on the Registrant’s financial condition and results of operations.” 

No cybercriminal operations have taken credit for the incident as of Friday.

IndustryNewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

Next Post

US, European law enforcement seize Russian crypto exchange Garantex and indict 2 administrators

Related Posts

CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data. The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing to legitimate
Avatar
Read More

Sparring in the Cyber Ring: Using Automated Pentesting to Build Resilience

“A boxer derives the greatest advantage from his sparring partner…” — Epictetus, 50–135 AD Hands up. Chin tucked. Knees bent. The bell rings, and both boxers meet in the center and circle. Red throws out three jabs, feints a fourth, and—BANG—lands a right hand on Blue down the center. This wasn’t Blue’s first day and despite his solid defense in front of the mirror, he feels the pressure.
Avatar
Read More

Microsoft Warns Default Helm Charts Could Leave Kubernetes Apps Exposed to Data Leaks

Microsoft has warned that using pre-made templates, such as out-of-the-box Helm charts, during Kubernetes deployments could open the door to misconfigurations and leak valuable data. "While these 'plug-and-play' options greatly simplify the setup process, they often prioritize ease of use over security," Michael Katchinskiy and Yossi Weizman from the Microsoft Defender for Cloud Research team
Avatar
Read More