Industrial tech manufacturer Sensata says ransomware attack is impacting production

Avatar

A ransomware attack on Massachusetts-based manufacturer Sensata Technologies last weekend has seriously disrupted the company’s systems.

The company, which has sites in about a dozen countries, notified the U.S. Securities and Exchange Commission (SEC) of the incident on Wednesday, warning investors that the ransomware attack forced officials to take its network offline. 

The incident began on Sunday and prompted the company to contact law enforcement.

“The incident has temporarily impacted Sensata’s operations, including shipping, receiving, manufacturing production, and various other support functions. While the Company has implemented interim measures to allow for the restoration of certain functions, the timeline for a full restoration is not yet known,” the company said in its 8-K filing. 

“The preliminary investigation has identified evidence that files were taken from the Company’s environment,” the company said.

Sensata, which reported nearly $4 billion in revenue in the last fiscal year, is an industrial technology company with more than 19,000 employees — producing sensors, electrical protection components and other tools for automotive, heavy vehicle and off-road, industrial, and aerospace markets.

Cybersecurity experts are assisting with the recovery effort, Sensata said, and they are working to identify the files that were stolen so that people can be notified of any personal information accessed. 

Sensata said it does not believe the attack will have a material impact on the company’s financial status for the current quarter but noted that this may change based on the outcome of the recovery. 

The company ships about 1 billion units of product each year. It’s best known for its work designing panel control switches for the Apollo 11 moon mission and for helping upgrade the Hubble space telescope.

No ransomware gang has taken credit for the incident as of Wednesday evening.

IndustryCybercrimeNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Rights group calls on Thai government to end alleged cyberattacks against civil society

Next Post

AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections

Related Posts

CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to
Avatar
Read More