HomeRisk ManagementsSchneider Electric Sustainability Unit Targeted by Ransomware Attack

Schneider Electric Sustainability Unit Targeted by Ransomware Attack

Published on

spot_img

Schneider Electric, a global company with its base in Paris and one of the leading providers of energy management and digital automation products, confirmed on Tuesday that its Schneider Electric Sustainability Business division had been hit by a ransomware attack. The attack led to the locking of Resource Advisor, a software used by the company to track energy consumption, emissions, and overall sustainability scores of more than 2,000 client companies. In addition to encrypting systems, the ransomware group, identified as Cactus, also accessed data, raising concerns about the security of sensitive client information.

The attack was attributed to the relatively new Cactus ransomware group, which first emerged in March 2023 and has quickly become a major player in the ransomware-as-a-service market. While Schneider Electric did not disclose the extent of the data breach, it stated that terabytes of data had been stolen and was being investigated by internal incident response teams and external cybersecurity specialists.

Despite the breach, Schneider Electric reassured that its core operations, including its manufacturing facilities for electrical parts, were unaffected by the attack. However, the incident has brought into focus the vulnerability of Schneider Electric’s sustainability division, which offers a range of products and services and reported revenues of 34 billion euros in the previous year.

The impact of the breach on Schneider Electric’s clients remains a concern, as the stolen data includes information related to their energy consumption and sustainability scores. The company’s commitment to protecting operational technologies, as well as its provision of cybersecurity services, is highlighted on its LinkedIn page, boasting a client base that includes 40% of Fortune 500 companies. However, the attack has raised questions about the company’s ability to safeguard its clients’ data and ensure the security of its systems.

This is not the first time Schneider Electric has been targeted by ransomware groups. Less than a year ago, the company fell victim to a mass hack by the Clop ransomware group, which affected thousands of organizations and exposed the personal information of over 77 million individuals. The repetition of such attacks on a company of Schneider Electric’s stature has not only exposed its vulnerabilities but also raised concerns about the security of critical infrastructure and sensitive client data.

As Schneider Electric works to remediate the effects of the attack and resume normal operations within two business days, much remains to be seen about the long-term consequences of the breach. The company’s assertion that it will continue to provide information and assistance to impacted customers is a positive step, but the trust and confidence of its clients, particularly with regard to the security of their sensitive data, may be harder to regain.

As the investigation into the breach continues, it is clear that Schneider Electric faces an uphill battle in addressing the fallout from the ransomware attack and in ensuring that its systems are robust enough to withstand future threats. The incident also serves as a warning to all organizations, regardless of their size or reach, about the growing sophistication and persistence of cybercriminals, who continue to target critical infrastructure and sensitive data with potentially far-reaching consequences.

Source link

Latest articles

CrowdStrike Global Threat Report: Increase of 75% in Cloud Intrusions

CrowdStrike's annual Global Threat Report for 2024 was released on Wednesday, revealing concerning statistics...

AI Generated Patches May Reduce Developer and Operations Workload

Large language models (LLMs) are offering a tantalizing prospect of speeding up software development...

VMware advises administrators to remove deprecated and vulnerable authentication plug-in

VMware Issued A Warning About Authentication System Vulnerability Specialists at VMware are strongly recommending administrators...

Could ransomware provider LockBit be responsible for the Lurie hack?

Following what has been described as a major breakthrough in the cyberattack against Lurie...

More like this

CrowdStrike Global Threat Report: Increase of 75% in Cloud Intrusions

CrowdStrike's annual Global Threat Report for 2024 was released on Wednesday, revealing concerning statistics...

AI Generated Patches May Reduce Developer and Operations Workload

Large language models (LLMs) are offering a tantalizing prospect of speeding up software development...

VMware advises administrators to remove deprecated and vulnerable authentication plug-in

VMware Issued A Warning About Authentication System Vulnerability Specialists at VMware are strongly recommending administrators...
en_USEnglish