German wind turbine giant Deutsche Windtechnik has issued a notification to warn that some of its IT systems were impacted in a targeted professional cyberattack earlier this month.
The incident, which the company says occured on April 11, forced incident responders to switch off the remote data monitoring connections to the wind turbines for security reasons. Deutsche Windtechnik says it reactivated the connections two days later.
“We are very happy that the wind turbines that we look after did not suffer any damage and were never in danger,” the company said in a statement.
Deutsche Windtechnik also announced that it managed to resume client operational maintenance activities on April 14, with only minor restrictions.
The company says all of its IT systems were assessed in a secure environment and the issues were identified and isolated. Furthermore, the wind turbine giant has increased the security of its systems following the incident.
“The forensic analysis has been completed and the result has shown that this was a targeted professional cyberattack,” Deutsche Windtechnik said. The company says it still hasn’t fully restored its systems.
While Deutsche Windtechnik did not say what type of cyberattack it fell victim to, there is a high probability that ransomware might have been involved, although no known ransomware groups have claimed the attack yet.
According to The Wall Street Journal, Deutsche Windtechnik, which lost control of roughly 2,000 turbines during the attack, indeed fell victim to ransomware, but was able to restore its systems without having to contact the attackers.
Additionally, the attack on Deutsche Windtechnik happened shortly after wind turbine maker Nordex SE fell victim to the Conti ransomware criminal gang. In early March, wind turbine manufacturer Enercon GmbH lost remote connection to roughly 5,800 turbines after Viasat’s satellite network was hacked.
Related: Conti Ransomware Activity Surges Despite Public Exposure
Related: Why Ransomware Response Matters More Than Protection
Related: FBI Shares Information on BlackCat Ransomware Attacks

More from Ionut Arghire
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Malicious NuGet Packages Used to Target .NET Developers
- Google Pixel Vulnerability Allows Recovery of Cropped Screenshots
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
Latest News
- Spain Needs More Transparency Over Pegasus: EU Lawmakers
- Ransomware Will Likely Target OT Systems in EU Transport Sector: ENISA
- Virtual Event Today: Supply Chain & Third-Party Risk Summit
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
