Conti Attack US Precision Engineering Business

A major US precision engineering business, Parker-Hannifin Corporation (Parker), a leading maker of aerospace systems, has confirmed that it was hit by hackers that has exposed employees’ personally identifiable information. 

One of the largest companies in the world in motion control technologies, Parker has disclosed that 'an unauthorised third party' gained access to its IT systems between the dates of March 11 and March 14, although the intrusion was not detected until May.

The Conti ransomware gang, a state-sponsored Russian hacking group, widely known for targeting critical national infrastructure and government systems, published the stolen data in April after claiming responsibility for the attack. 

Parker is an Ohio-based corporation specialising in advanced motion and control technologies, with a strong focus in aerospace hydraulic equipment. It has a revenue of $15.6 billion and employs over 58,000 people.

The company investigated the attack, which concluded that the threat actor acquired certain files on its IT systems which included information related to current and former employees, their dependents, and those on a health plan sponsored by Parker. The information may also have included bank account information, US passport numbers, Social Security numbers, dates of birth, driver’s license numbers, online account usernames and passwords. 

The investigation also revealed that certain files included dates of service, provider names, and medical treatment information.

Parker says it conducted 'basic protocols' to contain the attack when it was detected and has delivered breach notification letters to those affected. “Safeguarding the information held within the company's systems is critically important to Parker, and the company is continuing to take steps to help safeguard its systems and data against the rapidly evolving threats to company information. Parker regrets any inconvenience or concern this incident may cause,” said Parker’s press release.

While Parker has not disclosed who attacked them, the Conti ransomware group claimed responsibility in April when it published 3% of the data that they allegedly stole during their attack. Full publication of the entire 419GB data set followed on April 20, which most likely means that negotiations for the payment of a ransom failed or may never have happened. 

Parker:   PR Newswire:    Oodaloop:    Infosecurity Magazine:   Bleeping Computer:   

Secure World:    Cybersecurity.News

You Might Also Read: 

FBI & CISA Advice On Ransomware Attacks:
 

« Never Trust Anything Again - The Zero Trust World
Personal Data Of Two Million Texans Left Exposed For Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Spambrella

Spambrella

Spambrella provides email security with real-time threat protection. 100% SaaS (nothing to install)

IoT European Research Cluster (IERC)

IoT European Research Cluster (IERC)

IERC brings together EU-funded projects with the aim of defining a common vision for IoT technology and development research challenges.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Intelequia

Intelequia

Intelequia SOC is the Security Operations Center your company needs. 24x7 monitoring, protection and automated response to cyber threats.

Prescott

Prescott

Prescott acts as your guiding light in the preparation for your CMMC assessment and long after by governing your cybersecurity practice.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.