Security Experts:

Connect with us

Hi, what are you looking for?



U.S. Semiconductor Maker MaxLinear Discloses Ransomware Attack

United States-based broadband and networking semiconductor maker MaxLinear this week revealed that some of its operational systems were infected with the Maze ransomware.

United States-based broadband and networking semiconductor maker MaxLinear this week revealed that some of its operational systems were infected with the Maze ransomware.

In an 8-K filing with the U.S. Securities and Exchange Commission (SEC), the company revealed that, although systems within its IT infrastructure were impacted, no interruptions were caused.

“The ransomware attack has not materially affected our production and shipment capabilities, and order fulfillment has continued without material interruption,” the company says.

Last week, MaxLinear started sending letters to impacted individuals to inform them of the attack, revealing that the incident was detected on May 24, but that the attackers likely had access to the company’s systems since at least April 15, 2020.

“We immediately took all systems offline, retained third-party cybersecurity experts to aid in our investigation, contacted law enforcement, and worked to safely restore systems in a manner that protected the security of information on our systems,” reads a copy of the letter, which the chip maker submitted to the State of California’s Attorney General.

During the time they dwelt in the company’s network, the attackers were able to access various types of data, including personal information of its employees.

Impacted data includes names, mailing addresses, personal and company emails, employee ID numbers, driver’s license numbers, financial account numbers, Social Security numbers, dates of birth, work locations, compensation and benefit information, dependent details, and date of employment.

The company has prompted an enterprise-wide password reset operation and is also working on improving its security programs.

MaxLinear says that it does not plan to “satisfy the attacker’s monetary demands,” although the Maze ransomware operators have already started releasing what appears to be financial data stolen from the company.

The organization is working with a third-party to evaluate the information posted by the hackers. It has already restored some of the affected systems and equipment, but the restoration effort is ongoing.

“Although we have incurred and will incur incremental costs as a result of forensic investigation and remediation, we do not currently expect that the incident will materially or adversely affect our operating expenses,” the company says.

Related: Business Services Provider Conduent Hit by Ransomware

Related: Maze Ransomware Caused Disruptions at Cognizant

Related: Double Extortion: Ransomware’s New Normal Combining Encryption with Data Theft

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Incident Response

Cygnvs emerges from stealth mode with an incident response platform and $55 million in Series A funding.


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...