www.securityweek.com
Open in
urlscan Pro
2606:4700:20::ac43:61a9
Public Scan
Submitted URL: https://t.co/N8CoBYAulr
Effective URL: https://www.securityweek.com/conti-ransomware-gang-claims-cyberattack-wind-turbine-giant-nordex
Submission: On April 18 via api from US — Scanned from DE
Effective URL: https://www.securityweek.com/conti-ransomware-gang-claims-cyberattack-wind-turbine-giant-nordex
Submission: On April 18 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET /search/google
<form action="/search/google" accept-charset="UTF-8" method="get" id="google-cse-searchbox-form">
<div><input type="hidden" name="cx" id="edit-cx" value="016540353864684098383:6mcx-eenlzi">
<input type="hidden" name="cof" id="edit-cof" value="FORID:11">
<div class="form-item" id="edit-query-wrapper">
<input type="text" maxlength="128" name="query" id="edit-query" size="15" value="" title="Enter the terms you wish to search for." class="form-text"
style="background: url("https://www.google.com/coop/intl/en/images/google_custom_search_watermark.gif") left center no-repeat rgb(255, 255, 255);">
</div>
<input type="submit" name="op" id="edit-sa" value="Search" class="form-submit">
<input type="hidden" name="safe" id="edit-safe" value="off">
<input type="hidden" name="form_build_id" id="form-OzPb9PSP0U3SER-ki-QXqjaLDz0rAkqkFPagIfA1CH0" value="form-OzPb9PSP0U3SER-ki-QXqjaLDz0rAkqkFPagIfA1CH0">
<input type="hidden" name="form_id" id="edit-google-cse-searchbox-form" value="google_cse_searchbox_form">
</div>
</form>
Name: ccoptin — POST https://visitor.constantcontact.com/d.jsp
<form style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
<input type="hidden" value="1102592012458" name="m">
<input type="hidden" value="oi" name="p">
<div class="form-item">
<input type="text" class="form-text required" value="Business Email Address" size="60" name="ea" maxlength="128">
<input type="submit" class="submit" value="Subscribe" name="go">
</div>
</form>
Text Content
SECURITYWEEK NETWORK: * Cybersecurity News * Webcasts * Virtual Events SECURITY EXPERTS: WRITE FOR US * Subscribe * 2022 CISO Forum * ICS Cyber Security Conference * Contact * Malware & Threats * Vulnerabilities * Email Security * Virus & Malware * IoT Security * Threat Intelligence * Endpoint Security * Cybercrime * Cyberwarfare * Fraud & Identity Theft * Phishing * Malware * Tracking & Law Enforcement * Mobile & Wireless * Mobile Security * Wireless Security * Risk & Compliance * Risk Management * Compliance * Privacy * Supply Chain * Security Architecture * Cloud Security * Identity & Access * Data Protection * Network Security * Application Security * Security Strategy * Risk Management * Security Architecture * Disaster Recovery * Training & Certification * Incident Response * ICS/OT * IoT Security Home › Cybercrime CONTI RANSOMWARE GANG CLAIMS CYBERATTACK ON WIND TURBINE GIANT NORDEX By Ionut Arghire on April 15, 2022 Share The Conti ransomware gang has claimed responsibility for a cyberattack that forced wind turbine giant Nordex to shut down internal systems on March 31. The incident, the company revealed in early April, was identified at an early stage, but resulted in multiple systems across Nordex’s branches being taken offline. Earlier this week, the wind turbine maker said it was still working on restoring IT systems to return operations to normal, but did not provide an estimation as to when that might happen. However, the company also said that the incident only impacted its internal systems and that wind turbine farms continued operating normally. Communication with customers wasn’t affected either, the company said. [ READ: Ransomware Gang Leaks Files Stolen From Industrial Giant Parker Hannifin ] While Nordex did not say what type of cyberattack it suffered, the fact that it shut down numerous systems suggested right from the start that ransomware might have been involved. This supposition was apparently confirmed this week, when the Conti cybergang, which is known for many high-profile ransomware attacks, claimed responsibility for the incident. Conti “announced” the Nordex hack on their leaks site on the Tor network, but did not say whether any data was stolen during the intrusion. The entry on Conti’s site is dated April 11, but it appears that it was made public on April 14. SecurityWeek checked the site on Wednesday, when Nordex published a security incident update, and found no mention of the attack on the wind turbine giant. The US government issued a warning on Conti ransomware attacks in early March, roughly two weeks after the cybercrime ring announced support for the Russian invasion of Ukraine. The group also had to deal with several source code and internal chat leaks in retaliation to its pro-Russian position. Related: Ransomware Attack Disrupts Manufacturing at KP Snacks Related: Logistics Firm Hellmann Scrambling to Recover From Cyberattack Related: Ransomware Operators Leak Data Stolen From Wind Turbine Giant Vestas Share Ionut Arghire is an international correspondent for SecurityWeek. Previous Columns by Ionut Arghire: Juniper Networks Patches Vulnerabilities in Contrail Networking, Junos OS Conti Ransomware Gang Claims Cyberattack on Wind Turbine Giant Nordex New 'Enemybot' DDoS Botnet Targets Routers, Web Servers Google Patches Third Actively Exploited Chrome Zero-Day of 2022 Cloud Security Startup DoControl Raises $30 Million 2022 Singapore/APAC ICS Cyber Security Conference] 2022 CISO Forum: September 13-14 - A Virtual Event Virtual Event Series - Security Summit Online Events by SecurityWeek 2022 ICS Cyber Security Conference | USA [Hybrid: Oct. 24-27] sponsored links Tags: * NEWS & INDUSTRY * Cybercrime View the discussion thread. GET THE DAILY BRIEFING * Most Recent * Most Read * OHSU Apologizes After Phishing Test Draws Complaints * North Korea APT Lazarus Targeting Chemical Sector * Juniper Networks Patches Vulnerabilities in Contrail Networking, Junos OS * House Panels Probe Gov't Use of Facial Recognition Software * Conti Ransomware Gang Claims Cyberattack on Wind Turbine Giant Nordex * New 'Enemybot' DDoS Botnet Targets Routers, Web Servers * Google Patches Third Actively Exploited Chrome Zero-Day of 2022 * U.S. Gov Blames North Korea Hackers for $600M Cryptocurrency Heist * Critical Code Execution Flaw Haunts VMware Cloud Director * Cloud Security Startup DoControl Raises $30 Million Looking for Malware in All the Wrong Places? First Step For The Internet's next 25 years: Adding Security to the DNS Tattle Tale: What Your Computer Says About You Be in a Position to Act Through Cyber Situational Awareness Report Shows Heavily Regulated Industries Letting Social Networking Apps Run Rampant 2010, A Great Year To Be a Scammer. Don't Let DNS be Your Single Point of Failure How to Identify Malware in a Blink Defining and Debating Cyber Warfare The Five A’s that Make Cybercrime so Attractive How to Defend Against DDoS Attacks Security Budgets Not in Line with Threats Anycast - Three Reasons Why Your DNS Network Should Use It The Evolution of the Extended Enterprise: Security Strategies for Forward Thinking Organizations Using DNS Across the Extended Enterprise: It’s Risky Business POPULAR TOPICS * Cybersecurity News * IT Security News * Risk Management * Cybercrime * Cloud Security * Application Security * Smart Device Security SECURITY COMMUNITY * Virtual Cybersecurity Events * Webcast Library * CISO Forum * ICS Cyber Security Conference * IT Security Newsletters * InfosecIsland.Com STAY INTOUCH * Twitter * Facebook * LinkedIn Group * Cyber Weapon Discussion Group * RSS Feed * Submit Tip * Security Intelligence Group ABOUT SECURITYWEEK * Team * Advertising * Event Sponsorships * Writing Opportunities * Feedback * Contact Us Copyright © 2022 Wired Business Media. All Rights Reserved. Privacy Policy Close This Window