Semiconductor Equipment Manufacturer Semikron Became a Victim of LV Ransomware

German power semiconductor manufacturer Semikron was hit by ransomware attack, leaving the company’s network partially encrypted. Apparently, the company fell victim to the LV ransomware.

Let me remind you that we also reported that According to statistics from Coveware, victims have become less likely to pay hackers, and also that Building Materials Manufacturer Knauf Became a Victim of Black Basta Ransomware.

Semikron is an international German company whose main activity is production of power electronics.

Semikron employs more than 3,000 people in 24 offices and eight production sites around the world, including Germany, Brazil, China, France, India, Italy, Slovakia and the United States. The company’s turnover in 2020 was about $461,000,000.

According to the manufacturer’s official statement, Semikron suffered an attack “by a group of professional hackers.”

The attackers claimed to have stolen data from our systems. The attack also resulted in partial encryption of our IT systems and files. The entire network is currently being studied and subjected to cyber forensics.Semikron said.

According to the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik), malware operators are indeed blackmailing the company and threatening to leak allegedly stolen data.

Although the company does not disclose any information about the malware itself, Bleeping Computer writes that a ransom note posted on one of Semikron’s encrypted systems indicates that the attack is related to the LV ransomware, and the attackers claim that they stole 2 TB of documents from the company.

Semikron is currently working to address the impact of the incident and restore the health of its systems, seeking to “minimize disruptions for employees, customers and contractors and ensure the highest possible security of IT systems.”

The company added that it has also kept relevant authorities informed and cooperated with them throughout the investigation and will alert customers and partners if any evidence of data theft is found.
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published.


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button