Conti Attack US Precision Engineering Business

A major US precision engineering business, Parker-Hannifin Corporation (Parker), a leading maker of aerospace systems, has confirmed that it was hit by hackers that has exposed employees’ personally identifiable information. 

One of the largest companies in the world in motion control technologies, Parker has disclosed that 'an unauthorised third party' gained access to its IT systems between the dates of March 11 and March 14, although the intrusion was not detected until May.

The Conti ransomware gang, a state-sponsored Russian hacking group, widely known for targeting critical national infrastructure and government systems, published the stolen data in April after claiming responsibility for the attack. 

Parker is an Ohio-based corporation specialising in advanced motion and control technologies, with a strong focus in aerospace hydraulic equipment. It has a revenue of $15.6 billion and employs over 58,000 people.

The company investigated the attack, which concluded that the threat actor acquired certain files on its IT systems which included information related to current and former employees, their dependents, and those on a health plan sponsored by Parker. The information may also have included bank account information, US passport numbers, Social Security numbers, dates of birth, driver’s license numbers, online account usernames and passwords. 

The investigation also revealed that certain files included dates of service, provider names, and medical treatment information.

Parker says it conducted 'basic protocols' to contain the attack when it was detected and has delivered breach notification letters to those affected. “Safeguarding the information held within the company's systems is critically important to Parker, and the company is continuing to take steps to help safeguard its systems and data against the rapidly evolving threats to company information. Parker regrets any inconvenience or concern this incident may cause,” said Parker’s press release.

While Parker has not disclosed who attacked them, the Conti ransomware group claimed responsibility in April when it published 3% of the data that they allegedly stole during their attack. Full publication of the entire 419GB data set followed on April 20, which most likely means that negotiations for the payment of a ransom failed or may never have happened. 

Parker:   PR Newswire:    Oodaloop:    Infosecurity Magazine:   Bleeping Computer:   

Secure World:    Cybersecurity.News

You Might Also Read: 

FBI & CISA Advice On Ransomware Attacks:
 

« Never Trust Anything Again - The Zero Trust World
Personal Data Of Two Million Texans Left Exposed For Years »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Science Applications International Corporation (SAIC)

Science Applications International Corporation (SAIC)

SAIC is a premier technology integrator in the technical, engineering, intelligence, and enterprise information technology markets. Services and solutions include Cybersecurity.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Trellix

Trellix

Trellix is an extended detection and response (XDR) solutions provider created from a merger of McAfee Enterprise and FireEye Products.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.

Infodot Technologies

Infodot Technologies

Infodot Technologies specialize in a co-managed IT support and services approach, where businesses share their IT responsibilities with a skilled Managed IT Services Provider (MSP).

NAM-CSIRT

NAM-CSIRT

NAM-CSIRT is a team established to contribute to the security and stability of critical infrastructure and critical information infrastructure of the Republic of Namibia.