Cybercrime

Cable Giant Volex Targeted in Cyberattack

UK-based cable manufacturing giant Volex has been targeted in a cyberattack that involved unauthorized access to IT systems and data.

UK-based cable manufacturing giant Volex has been targeted in a cyberattack that involved unauthorized access to IT systems and data.

UK-based cable manufacturing giant Volex (AIM: VLX) has been targeted in a cyberattack that involved unauthorized access to some of the company’s IT systems and data. 

In a statement issued on Monday, the power and data transmission product manufacturer said all of its sites remain operational and it does not expect any financial impact caused by the incident to be material.

However, it did admit that there has been some “minimal disruption to global production levels”. 

“On becoming aware of the incident, the Group enacted its established IT security protocols and took immediate steps to stop the unauthorised access to its systems and data. Specialist, third party consultants have been engaged to investigate the nature and extent of the incident, and to implement the incident response plan,” Volex said.

Volex has not responded to SecurityWeek’s request for additional information, but based on the company’s brief description of the incident, it may have been targeted in a ransomware attack that was either discovered early or that did not involve the deployment of file-encrypting malware, which can typically cause significant disruption in an organization.

SecurityWeek has checked the leak websites of several major ransomware groups, but found no mention of Volex on any of them. 

Volex shares on the Alternative Investment Market (AIM) of the London Stock Exchange dropped slightly after news of the breach broke.

Advertisement. Scroll to continue reading.

Volex provides power cords, plugs, connectors, electric vehicle charging solutions, consumer cable harnesses, data transfer cables, and data center power cables. The firm has 27 manufacturing locations and a global workforce of more than 11,500 across 24 countries. 

Related: MGM Resorts Says Ransomware Hack Cost $110 Million

Related: Sony Confirms Data Stolen in Two Recent Hacker Attacks

Related: Motel One Discloses Ransomware Attack Impacting Customer Data

Related: Johnson Controls Ransomware Attack Could Impact DHS

Related Content

Malware & Threats

The Black Basta group abuses remote connection tool Quick Assist in vishing attacks leading to ransomware deployment.

Data Breaches

Nissan North America determined recently that a ransomware attack launched last year resulted in employee personal information compromise.

Data Breaches

The City of Wichita says files containing personal information were exfiltrated in a recent ransomware attack.

Data Breaches

Singing River Health System says the personal information of roughly 900,000 individuals was stolen in an August 2023 ransomware attack.

Ransomware

The US government warns of Black Basta ransomware attacks targeting critical infrastructure organizations.

Data Breaches

The Ohio Lottery cyberattack conducted by the DragonForce ransomware group has impacted more than 500,000 individuals.

Data Breaches

Tech giant notifies millions of customers that full names and physical mailing addresses were stolen during a security incident.

Ransomware

The LockBit cybercrime group has taken credit for the recent ransomware attack that disrupted City of Wichita systems.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version