Schneider Electric says hackers accessed internal project execution tracking platform

Avatar

French multinational Schneider Electric confirmed on Monday that it is investigating a cyberattack following reports of a breach.

The company told Recorded Future News that its global incident response team has been mobilized to look into an alleged ransomware attack, which was claimed by a relatively unknown group on Saturday. 

“Schneider Electric is investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms which is hosted within an isolated environment,” the company said. 

Schneider Electric is one of the world’s largest digital automation and energy management companies, with more than 100,000 employees and a reported revenue of $39 billion last year.

In January, the company said its Sustainability Business division suffered from a ransomware attack that affected its Resource Advisory product — a data visualization tool for sustainability information — as well as other “division specific systems.”

On Saturday, the HellCat ransomware gang took credit for the most recent attack, claiming it accessed Schneider Electric’s Atlassian Jira system, allowing them to allegedly steal about 40GB worth of project data and user information. 

The gang threatened to leak the information if it was not paid a $125,000 ransom. 

The group emerged last week and has since claimed an attackon Jordan’s Ministry of Education, an incident that could not be verified. 

Little is known about the group, but the FBI told CyberScoop last week that it has conducted more than 30 ransomware disruption operations this year — likely leading to groups splintering off into smaller operations. 

BleepingComputer, which first reported the incident, allegedly spoke to one of the hackers behind the attack on Schneider Electric and the person made several claims in an interview with the outlet as well as on social media site X.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Cyberattack disrupts classes at Irish technology university

Next Post

Cisco notifies ‘limited set’ of customers after hacker accessed non-public files

Related Posts

New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu, Red Hat Enterprise Linux, and Fedora, according to the Qualys Threat Research Unit (TRU). Tracked as CVE-2025-5054 and CVE-2025-4598, both vulnerabilities are race condition bugs that could enable a local attacker to obtain access to access sensitive information. Tools like
Avatar
Read More

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

Can a harmless click really lead to a full-blown cyberattack? Surprisingly, yes — and that’s exactly what we saw in last week’s activity. Hackers are getting better at hiding inside everyday actions: opening a file, running a project, or logging in like normal. No loud alerts. No obvious red flags. Just quiet entry through small gaps — like a misconfigured pipeline, a trusted browser feature,
Avatar
Read More