Security News > 2022 > January > Defense contractor Hensoldt confirms Lorenz ransomware attack
Hensoldt, a multinational defense contractor headquartered in Germany, has confirmed that some of its UK subsidiary's systems were compromised in a ransomware attack.
While the company is yet to issue a public statement regarding this incident, the Lorenz ransomware gang has already claimed the attack.
For its part, the Lorenz ransomware group claims to have stolen an undisclosed amount of files from Hensholdt's network during the attack.
While Lorenz shows the leak as being "Paid," it's unclear if that means Hensoldt paid a ransom or if another threat actor purchased the data.
This is because the Lorenz ransomware gang is known for selling stolen data to other threat actors to pressure victims into paying ransoms.
In June, Dutch cybersecurity firm Tesorion released a free Lorenz ransomware decryptor, which victims can use to recover some file types, including Office documents, PDF files, images, and videos.
News URL
Related news
- Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (source)
- North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack (source)
- North Korean govt hackers linked to Play ransomware attack (source)
- City of Columbus: Data of 500,000 stolen in July ransomware attack (source)
- Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- Halliburton reports $35 million loss after ransomware attack (source)
- New Ymir ransomware partners with RustyStealer in attacks (source)
- New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks (source)
- New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems (source)