United States trucks and military vehicles maker Navistar International Corporation has confirmed a cyberattack that resulted in some data being stolen.
On Monday, in a Form 8-K filing with the Securities and Exchange Commission (SEC), Navistar said it learned of a credible potential cybersecurity threat to its information technology system on May 20, 2021.
Navistar immediately took the necessary measures to contain and mitigate the impact of the incident, and also launched an investigation into the matter, engaging with security and forensics experts.
The company also took steps to strengthen the security of its IT infrastructure and protect the data contained therein, and says that its systems have remained fully operational.
However, on May 31, Navistar “received a claim that certain data had been extracted from” its network.
The company continues to investigate “and address the scope and impact of the cybersecurity incident” and has already contacted law enforcement on the issue.
Navistar did not provide technical details on the incident, but there is a possibility that ransomware might have been involved, considering the rising number of ransomware incidents observed in recent months in which attackers stole victim data to use it as leverage.
Created in 1986, Navistar makes trucks, buses and diesel engines, while its Navistar Defense subsidiary produces military vehicles.
Following a ransomware attack that forced Colonial Pipeline to shut down distribution systems at the beginning of May, JBS USA, the US subsidiary of the world’s largest meat processing company, announced last week that it too suspended operations in America and Australia.
Also last week, Steamship Authority, the largest ferry service to the Massachusetts Islands of Martha’s Vineyard and Nantucket from Cape Cod, was hit with a similar attack. Earlier this year, Molson Coors Beverage Company fell victim to ransomware.
Related: White House Urges Private Sector to Help in Ransomware Fight
Related: CISOs Blame Cyberattack Surge on Remote Working: VMware

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
- High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- China Says It’s Looking Into Report of Spy Balloon Over US
- GoAnywhere MFT Users Warned of Zero-Day Exploit
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
