Medical device company says shipping processes disrupted by ransomware attack

Avatar

A company that makes products used in heart surgeries said its delivery systems have been disrupted by a pre-Thanksgiving ransomware attack.

Atlanta-based Artivion filed documents with the U.S. Securities and Exchange Commission (SEC) on Monday morning warning that the incident was having an impact on its operations. 

The company identified the cyberattack on November 21 and was forced to take some systems offline in response. 

“The incident involved the acquisition and encryption of files,” the company said in an 8-K filing. “The Company continues to provide its products and services to customers, but the incident has caused disruptions to some order and shipping processes, as well as to certain corporate operations, which have largely been mitigated.”

While some of the attack’s costs will be covered by cyberinsurance, Artivion said it “believes that it will incur additional costs that will not be covered by insurance.” 

The company also “remains subject to various risks due to the incident, including the impact of delays in restoration, and, as a result, cannot provide assurances that the incident will not be determined to have a material impact in the future.”

Outside cybersecurity experts have been hired to help with the recovery and Artivion explained that it is “working to securely restore its systems as quickly as possible and to evaluate any notification obligations.” 

No ransomware gang has taken credit for the incident as of Monday afternoon. 

The company, which reported $95.8 million in revenue for the most recent quarter, designs products used in cardiac and vascular surgeries. It primarily produces aortic stent grafts, surgical sealants, mechanical heart valves and implantable cardiac and vascular human tissues.

Artivion has manufacturing plants in Georgia, Texas and Germany, and it offers products in more than 100 countries. The company said it expects to bring in an estimated $396 million for 2024. 

Cyberattacks impacted multiple healthcare manufacturers last year, including giants like Zoll and Henry Schein as well as heart-focused companies like CardioComm

CybercrimeNewsIndustry
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

Next Post

The Future of Network Security: Automated Internal and External Pentesting

Related Posts

Necro Android Malware Found in Popular Camera and Browser Apps on Play Store

Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some of the malicious apps have also been found on the Google Play Store. They have been cumulatively downloaded 11 million times. They include - Wuta Camera - Nice Shot Always (com.benqu.wuta) - 10+ million
Avatar
Read More

Russian RomCom Attacks Target Ukrainian Government with New SingleCamper RAT Variant

The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government agencies and unknown Polish entities since at least late 2023. The intrusions are characterized by the use of a variant of the RomCom RAT dubbed SingleCamper (aka SnipBot or RomCom 5.0), said Cisco Talos, which is monitoring the activity cluster under the moniker UAT-5647. "This
Avatar
Read More

CISA Urges Agencies to Patch Critical “Array Networks” Flaw Amid Active Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a now-patched critical security flaw impacting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities (KEV) catalog following reports of active exploitation in the wild. The vulnerability, tracked as CVE-2023-28461 (CVSS score: 9.8), concerns a case of missing authentication that
Avatar
Read More