MATLAB developer bringing systems back online following ransomware attack

Avatar

The developer of the popular MATLAB programming language and numeric computing environment said a ransomware attack is impacting its IT systems. 

Massachusetts-based MathWorks provided an update to customers on Monday after initially reporting outages on May 18, confirming that it experienced a ransomware attack that took down online applications and internal systems used by staff. 

“We have notified federal law enforcement of this matter,” the company said. “We have brought many of these systems back online and are continuing to bring other systems back online with the assistance of cybersecurity experts.”

MathWorks has millions of users, many of which are engineers and scientists who use MATLAB for data analysis, computation and more. MATLAB and other MathWorks products are used by about 6,500 colleges and universities, according to the company. The company has 6,500 employees and more than 30 offices across Europe, Asia and North America. 

The incident impacted multiple MATLAB tools as well as parts of the MathWorks site, including the career page, the cloud center, the store and the file exchange. MATLAB Online and MATLAB Mobile were restored on Friday. 

In an update on Tuesday, MathWorks said it was still investigating the issue. Multiple pages on the MathWorks website are still down. The company did not immediately respond to a request for comment.

An expansive data breach report from Verizon last month found that ransomware was used in nearly half of the 12,195 confirmed data breaches in 2024.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

New Self-Spreading Malware Infects Docker Containers to Mine Dero Cryptocurrency

Next Post

Nearly 70,000 impacted by ransomware attack on Sheboygan, Wisconsin

Related Posts

Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2). The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities. "Misuse of cloud
Avatar
Read More