Security Experts:

Connect with us

Hi, what are you looking for?



Wind Turbine Giant Nordex Scrambling to Recover From Cyberattack

Nordex says cyber incident limited to internal IT infrastructure, wind turbine farms unaffected

Nordex says cyber incident limited to internal IT infrastructure, wind turbine farms unaffected

Wind turbines manufacturing giant Nordex Group this week announced that it is still working on restoring systems after a crippling cyberattack on March 31.

The incident was publicly disclosed in early April, when the company announced that it shut down “IT systems across multiple locations and business units” to contain the issue.

The company also said that the cyberattack was detected in its early stages, and that it immediately set up an incident response team to investigate and address the breach.

On Tuesday, the wind turbine maker published an updated incident notification, saying that it was still working on restoring systems to “enable business continuity and resume normal operations as soon as reasonably practicable.”

However, the company also announced that, while it disabled remote access from its infrastructure for turbines under contract, wind turbine farms were not affected by the attack and continued to operate normally.

“Nordex turbines continued operating without restrictions and wind farm communication with grid operators and energy traders was and remains unaffected,” the company announced.

Furthermore, Nordex announced that it has implemented alternative remote control services for most of its fleet, to ensure business continuity.

The investigation conducted by the company’s emergency response team in collaboration with relevant authorities has shown that only internal systems within Nordex’s environment were affected by the attack.

“Preliminary results of the analysis suggest that the impact of the incident has been limited to internal IT infrastructure. There is no indication that the incident spread to any third-party assets or otherwise beyond Nordex’ internal IT infrastructure,” the company announced.

It’s still unclear if ransomware was involved in the incident. 

Related: Ransomware Attack Disrupts Manufacturing at KP Snacks

Related: Logistics Firm Hellmann Scrambling to Recover From Cyberattack

Related: Ransomware Operators Leak Data Stolen From Wind Turbine Giant Vestas

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.