Security News > 2023 > May > US govt contractor ABB confirms ransomware attack, data theft

Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as "An IT security incident."
"ABB has determined that an unauthorized third-party accessed certain ABB systems, deployed a type of ransomware that is not self-propagating, and exfiltrated certain data," the company said in a press release.
The investigation is still in its early stages, and ABB is also working with advisors and law enforcement to minimize the ransomware attack's impact.
ABB reported revenue of $29.4 billion for 2022 and has roughly 105,000 employees that develop industrial control systems and SCADA systems for manufacturing and energy suppliers.
While ABB didn't reveal the name of the attackers, BleepingComputer independently confirmed that the attack was conducted by the Black Basta ransomware gang with the help of an anonymous source familiar with the incident.
"ABB recently detected an IT security incident that directly affected certain locations and systems," the company told BleepingComputer in a statement after the attack.
News URL
Related news
- US indicts 8Base ransomware operators for Phobos encryption attacks (source)
- Hacker pleads guilty to SIM swap attack on US SEC X account (source)
- All your 8Base are belong to us: Ransomware crew busted in global sting (source)
- US sanctions LockBit ransomware’s bulletproof hosting provider (source)
- RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset (source)
- Chinese espionage tools deployed in RA World ransomware attack (source)
- Critical PostgreSQL bug tied to zero-day attack on US Treasury (source)
- Lee Enterprises newspaper disruptions caused by ransomware attack (source)
- US newspaper publisher uses linguistic gymnastics to avoid saying its outage was due to ransomware (source)
- Southern Water says Black Basta ransomware attack cost £4.5M in expenses (source)