Belgium-based aircraft parts maker ASCO Industries has been severely hit by a ransomware attack that started last week.
Founded in 1954, ASCO has four manufacturing plants in Belgium, the US, Canada and Germany, and it employs 1,500 people. The company’s products are used by most aircraft manufacturers, including Airbus, Boeing and Lockheed Martin. ASCO was taken over last year by US-based Spirit AeroSystems.
According to media reports, ASCO’s machines were infected with an unidentified piece of ransomware on Friday and the company has been having trouble restoring operations.
The incident has reportedly disrupted the company’s ability to supply products to customers and impacted roughly 1,000 employees, which have been placed on temporary leave.
SecurityWeek has reached out to ASCO for clarifications, but the firm has yet to respond. ASCO representatives said the attackers don’t appear to have stolen any information.
“The attack against ASCO has once again highlighted the dangerous power of ransomware. The attack has brought operations to a halt and resulted in over a thousand employees being sent home which will be having a significant impact on the organisation financially,” Andrea Carcano, CPO and co-founder of Nozomi Networks, told SecurityWeek.
“When it comes to ransomware, prevention is always better than cure as, if infected, it is never advisable to pay the ransom as it is not guaranteed that the criminals will honour the agreement and restore systems/data. Organisations should prepare for these types of events and have an incident response plan in place to help limit the damage caused, not only to production but also to customer trust and brand reputation,” Carcano added.
Several important organizations have been hit by ransomware over the past year, including Eurofins Scientific, COSCO, Norsk Hydro, the UK Police Federation, and Aebi Schmidt.
Related: New Sodinokibi Ransomware Delivered via Oracle WebLogic Flaw
Related: GandCrab Ransomware Detected Targeting Manufacturing Firm
Related: Utah County Struck by Ransomware

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
- Cybercriminals, APT Exploited Telerik Vulnerability in Attacks on US Government Agency
Latest News
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Ferrari Says Ransomware Attack Exposed Customer Data
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
