Vestas: majority of IT systems restored after ransomware attack

Vestas likely suffered a ransomware attack on 19 November, but almost all of its IT systems are now up and running again, the world’s largest wind turbine maker said.

In an update, the company said that since the cyber security incident was discovered 19 November 2021, Vestas and its external partners have worked around the clock to re-establish normal operations:

“Having conducted extensive investigations, forensics, restoration activities and hardening of our IT systems and IT infrastructure, we are pleased to announce that almost all systems are up and running.”

Henrik Andersen, president and CEO, added: “We have been through some tough days since we discovered the cyber incident, and executive management and the board of directors are thus very pleased that the incident didn’t impact wind turbine operations and almost all of our IT systems are running again.”

“There is still a lot of work ahead of us to and we must remain extremely diligent towards cyber threats. I would already now like to take this opportunity to thank our customers, employees and external partners for their understanding and extraordinary support in these challenging circumstances.”

Although Vestas is close to normal operations, the work and investigations are still ongoing, the company said.

Vestas maintains there is no indication that the event has impacted customer and supply chain operations, which it said is supported by the forensics investigation carried out with the assistance of third-party experts.

It added that the cyber incident, which its investigations indicate was ransomware, impacted Vestas’ internal systems and resulted in data being compromised. The extent to which data has been compromised is still being investigated, but for now it appears that the data foremost relates to Vestas’ internal matters.

Follow us on twitter: @risksEmerging

The @WhiteHouse just issued a Memorandum on Improving the #Cybersecurity of National #Security 🛡️👩‍💻🇺🇸 It gives agencies 180 days to report a timeline to transition to compliant #cryptography, @NSAGov-approved #Quantum-Resistant #Encryption #Algorithms 🌐🔐https://www.whitehouse.gov/briefing-room/presidential-actions/2022/01/19/memorandum-on-improving-the-cybersecurity-of-national-security-department-of-defense-and-intelligence-community-systems/

Protect your life by keeping your accounts 100% secure. 💻

#cybersecurity #databreach #cybercrime #ransomwareattacks #datasecurity

Russia Arrests REvil Ransomware Gang Responsible for High-Profile Cyber Attacks http://dlvr.it/SH9Kv4 #news #cybersecurity #infosec

.@POTUS signs a memorandum requiring national security systems to employ similar #cybersecurity measures as those recommended for federal civilian networks and provides additional power to @NSAGov. @dangun127 reports:https://bit.ly/33WOqAA

#ISMGNews #CybersecurityNews #InfoSec

Rory Stewart - #PartyGate should be the last nail in Boris Johnson's coffin... Johnson was manifestly unsuited to be Prime Minister from the beginning, & it's very, very disturbing that a great country, like Britain, should have chosen somebody so unsuitable for the role.

🔥 awesome-apisec: A collection of awesome API Security tools and resources

📖 Contains tools, mindmaps, cheatsheets and many more cool resources for #API #Pentesting

🔗 https://github.com/arainho/awesome-api-security

#infosec #cybersecurity #bugbounty

I'm going to give $1,000 to someone random who retweets this tweet in the next 7 hours (on top of the other money I'm giving away, must be following me so I can dm you!)

Load More...
SHARE: