Sierra Wireless halts production after ransomware attack
The attack, which brought down the IoT firm's internal IT systems, also prompted the company to withdraw its Q1 2021 guidance
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
IoT solutions provider Sierra Wireless has been forced to halt production at its manufacturing site after being hit by a ransomware attack.
The attack took place on 20 March, and was discovered by the company three days later. Despite an immediate response from the Sierra Wireless' IT and operations teams, hackers managed to bring down its internal IT systems, disrupting the Sierra Wireless website and the internal operations of the company.
It also prompted the company to withdraw its Q1 2021 guidance, which was published on 23 February 2021 and provided information on the company’s fourth-quarter and full-year 2020 results. According to an error message, the website which contained the guidance is now “under maintenance”.
How safe is the IoT? Hackers auction stolen CD Projekt data with ‘charity fundraiser' The top 12 password-cracking techniques used by hackers
Sierra Wireless announced that it has “implemented measures to counter the attack in accordance with established cyber security procedures and policies that were developed in collaboration with third-party advisors”.
Although Sierra Wireless’ customer-facing products and services are thought to have come out fo the attack unscathed, the company has asked its customers and partners for patience “as it seeks to remediate the situation”.
The ransomware attack has also forced the company to halt production at its manufacturing sites but is hoping to resume normal operations “soon”. Although headquartered in British Columbia, Canada, Sierra Wireless maintains multiple offices and operations around the globe, including the US, Brazil, Germany, Sweden, Korea, Japan, China, Taiwan, France, and Hong Kong.
The amount of the ransom and the identity of the attackers is unknown at this time. IT Pro has reached out to Sierra Wireless for more information about the attack but has yet to hear back from the company.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The incident comes just days after ransomware collective REvil demanded $50 million (£36 million) from Acer, in what is thought to be the gang's most costly attack yet. The Taiwanese PC manufacturer has been given until March 28 to send over funds before any stolen data is leaked.
The Acer ransomware attack is believed to be linked to the Microsoft Exchange hack from earlier this month, which was orchestrated by 'at least ten hacker groups' and affected ‘hundreds of thousands’ of victims, including in the UK.
Having only graduated from City University in 2019, Sabina has already demonstrated her abilities as a keen writer and effective journalist. Currently a content writer for Drapers, Sabina spent a number of years writing for ITPro, specialising in networking and telecommunications, as well as charting the efforts of technology companies to improve their inclusion and diversity strategies, a topic close to her heart.
Sabina has also held a number of editorial roles at Harper's Bazaar, Cube Collective, and HighClouds.
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
-
Google issues warning over ShinyHunters-branded vishing campaignsNews Related groups are stealing data through voice phishing and fake credential harvesting websites
-
The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwiseNews Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals
-
Everything we know so far about the Nike data breachNews Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data
-
There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radarNews The new DeadLock ransomware family is taking off in the wild, researchers warn
-
Hacker offering US engineering firm data online after alleged breachNews Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen


