Swiss manufacturer investigating ransomware attack that shut down IT network

Avatar

Hackers are attempting to blackmail a Swiss manufacturing giant after a cyberattack on Friday.

Schlatter Group did not respond to questions about the incident, but said in a press release that it was dealing with a “criminal cyberattack using malware.”

The company — which is more than 100 years old and specializes in plant engineering as well as welding — immediately initiated security measures and involved law enforcement when the attack was discovered on Friday.

Schlatter Group currently does not have access to its email system and urged customers to call them if there are any issues. As part of the investigation, the company is assessing whether data was stolen. 

“It can be assumed that this was a professional attack. The unknown perpetrators are attempting to blackmail Schlatter. The ICT experts are working intensively to make all systems available and functional again as quickly as possible,” the company explained. 

No ransomware gang or hacking group has taken credit for the attack as of Monday afternoon. 

The company is deeply involved in the automation of production systems, offering customers plant engineering services for resistance welding systems as well as weaving and finishing equipment for the production of paper machine clothing, wire fabrics and wire mesh.

It reported nearly $150 million in sales over the last fiscal year. 

Swiss authorities in June said they saw an increase in cyberattacks ahead of a Ukraine peace summit and the country’s president is frequently criticized in Russian media.

Last year, Swiss technology conglomerate ABB was hit with a ransomware attack launched by a cybercriminal gang with deep ties in Russia.

CybercrimeIndustryNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig

is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Previous Post

Feds seize Radar/Dispossessor ransomware gang servers in US and Europe

Next Post

‘Prolific’ malvertising scammer arrested and extradited to US to face charges

Related Posts

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)

What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people. This week makes one thing clear: no system, no person, no organization is truly off-limits. Attackers are getting smarter, faster, and more creative—using everything from human trust to hidden flaws in
Avatar
Read More

Researchers Uncover Vulnerabilities in Open-Source AI and ML Models

A little over three dozen security vulnerabilities have been disclosed in various open-source artificial intelligence (AI) and machine learning (ML) models, some of which could lead to remote code execution and information theft. The flaws, identified in tools like ChuanhuChatGPT, Lunary, and LocalAI, have been reported as part of Protect AI's Huntr bug bounty platform. The most severe of the
Avatar
Read More