Conti Attack US Precision Engineering Business

A major US precision engineering business, Parker-Hannifin Corporation (Parker), a leading maker of aerospace systems, has confirmed that it was hit by hackers that has exposed employees’ personally identifiable information. 

One of the largest companies in the world in motion control technologies, Parker has disclosed that 'an unauthorised third party' gained access to its IT systems between the dates of March 11 and March 14, although the intrusion was not detected until May.

The Conti ransomware gang, a state-sponsored Russian hacking group, widely known for targeting critical national infrastructure and government systems, published the stolen data in April after claiming responsibility for the attack. 

Parker is an Ohio-based corporation specialising in advanced motion and control technologies, with a strong focus in aerospace hydraulic equipment. It has a revenue of $15.6 billion and employs over 58,000 people.

The company investigated the attack, which concluded that the threat actor acquired certain files on its IT systems which included information related to current and former employees, their dependents, and those on a health plan sponsored by Parker. The information may also have included bank account information, US passport numbers, Social Security numbers, dates of birth, driver’s license numbers, online account usernames and passwords. 

The investigation also revealed that certain files included dates of service, provider names, and medical treatment information.

Parker says it conducted 'basic protocols' to contain the attack when it was detected and has delivered breach notification letters to those affected. “Safeguarding the information held within the company's systems is critically important to Parker, and the company is continuing to take steps to help safeguard its systems and data against the rapidly evolving threats to company information. Parker regrets any inconvenience or concern this incident may cause,” said Parker’s press release.

While Parker has not disclosed who attacked them, the Conti ransomware group claimed responsibility in April when it published 3% of the data that they allegedly stole during their attack. Full publication of the entire 419GB data set followed on April 20, which most likely means that negotiations for the payment of a ransom failed or may never have happened. 

Parker:   PR Newswire:    Oodaloop:    Infosecurity Magazine:   Bleeping Computer:   

Secure World:    Cybersecurity.News

You Might Also Read: 

FBI & CISA Advice On Ransomware Attacks:
 

« Never Trust Anything Again - The Zero Trust World
Personal Data Of Two Million Texans Left Exposed For Years »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Cybero

Cybero

Cybero offers professional corporate cybersecurity training tailored to your business requirements.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

CyberCX

CyberCX

CyberCX provides services from strategic consulting, security testing and training to world-class managed services and engineering solutions.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Allurity

Allurity

Allurity is a group of tech-enabled cybersecurity service providers, comprised of best-in-class experts with a common mission to enable a safe digital world.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

SafeBase

SafeBase

Safebase provide the infrastructure for Trust Communication. Our Trust Center enables Security and Sales teams to share and automate access to security, compliance, and privacy information.

Amplifier Security

Amplifier Security

Amplifier Security are on a mission to empower security teams to modernize their practice by connecting the dots between their security stack and their people.