www.securityweek.com Open in urlscan Pro
2606:4700:20::ac43:61a9  Public Scan

Submitted URL: https://t.co/N8CoBYAulr
Effective URL: https://www.securityweek.com/conti-ransomware-gang-claims-cyberattack-wind-turbine-giant-nordex
Submission: On April 18 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search/google

<form action="/search/google" accept-charset="UTF-8" method="get" id="google-cse-searchbox-form">
  <div><input type="hidden" name="cx" id="edit-cx" value="016540353864684098383:6mcx-eenlzi">
    <input type="hidden" name="cof" id="edit-cof" value="FORID:11">
    <div class="form-item" id="edit-query-wrapper">
      <input type="text" maxlength="128" name="query" id="edit-query" size="15" value="" title="Enter the terms you wish to search for." class="form-text"
        style="background: url(&quot;https://www.google.com/coop/intl/en/images/google_custom_search_watermark.gif&quot;) left center no-repeat rgb(255, 255, 255);">
    </div>
    <input type="submit" name="op" id="edit-sa" value="Search" class="form-submit">
    <input type="hidden" name="safe" id="edit-safe" value="off">
    <input type="hidden" name="form_build_id" id="form-OzPb9PSP0U3SER-ki-QXqjaLDz0rAkqkFPagIfA1CH0" value="form-OzPb9PSP0U3SER-ki-QXqjaLDz0rAkqkFPagIfA1CH0">
    <input type="hidden" name="form_id" id="edit-google-cse-searchbox-form" value="google_cse_searchbox_form">
  </div>
</form>

Name: ccoptinPOST https://visitor.constantcontact.com/d.jsp

<form style="" method="post" target="_blank" action="https://visitor.constantcontact.com/d.jsp" name="ccoptin">
  <input type="hidden" value="1102592012458" name="m">
  <input type="hidden" value="oi" name="p">
  <div class="form-item">
    <input type="text" class="form-text required" value="Business Email Address" size="60" name="ea" maxlength="128">
    <input type="submit" class="submit" value="Subscribe" name="go">
  </div>
</form>

Text Content

SECURITYWEEK NETWORK:

 * Cybersecurity News
 * Webcasts
 * Virtual Events


SECURITY EXPERTS:

WRITE FOR US


 * Subscribe
 * 2022 CISO Forum
 * ICS Cyber Security Conference
 * Contact




 * Malware & Threats
   * Vulnerabilities
   * Email Security
   * Virus & Malware
   * IoT Security
   * Threat Intelligence
   * Endpoint Security
 * Cybercrime
   * Cyberwarfare
   * Fraud & Identity Theft
   * Phishing
   * Malware
   * Tracking & Law Enforcement
 * Mobile & Wireless
   * Mobile Security
   * Wireless Security
 * Risk & Compliance
   * Risk Management
   * Compliance
   * Privacy
   * Supply Chain
 * Security Architecture
   * Cloud Security
   * Identity & Access
   * Data Protection
   * Network Security
   * Application Security
 * Security Strategy
   * Risk Management
   * Security Architecture
   * Disaster Recovery
   * Training & Certification
   * Incident Response
 * ICS/OT
 * IoT Security


Home › Cybercrime



CONTI RANSOMWARE GANG CLAIMS CYBERATTACK ON WIND TURBINE GIANT NORDEX

By Ionut Arghire on April 15, 2022
Share





The Conti ransomware gang has claimed responsibility for a cyberattack that
forced wind turbine giant Nordex to shut down internal systems on March 31.

The incident, the company revealed in early April, was identified at an early
stage, but resulted in multiple systems across Nordex’s branches being taken
offline.

Earlier this week, the wind turbine maker said it was still working on restoring
IT systems to return operations to normal, but did not provide an estimation as
to when that might happen.

However, the company also said that the incident only impacted its internal
systems and that wind turbine farms continued operating normally. Communication
with customers wasn’t affected either, the company said.

[ READ: Ransomware Gang Leaks Files Stolen From Industrial Giant Parker Hannifin
]

While Nordex did not say what type of cyberattack it suffered, the fact that it
shut down numerous systems suggested right from the start that ransomware might
have been involved.

This supposition was apparently confirmed this week, when the Conti cybergang,
which is known for many high-profile ransomware attacks, claimed responsibility
for the incident.

Conti “announced” the Nordex hack on their leaks site on the Tor network, but
did not say whether any data was stolen during the intrusion.

The entry on Conti’s site is dated April 11, but it appears that it was made
public on April 14. SecurityWeek checked the site on Wednesday, when Nordex
published a security incident update, and found no mention of the attack on the
wind turbine giant.

The US government issued a warning on Conti ransomware attacks in early March,
roughly two weeks after the cybercrime ring announced support for the Russian
invasion of Ukraine. The group also had to deal with several source code and
internal chat leaks in retaliation to its pro-Russian position.

Related: Ransomware Attack Disrupts Manufacturing at KP Snacks

Related: Logistics Firm Hellmann Scrambling to Recover From Cyberattack

Related: Ransomware Operators Leak Data Stolen From Wind Turbine Giant Vestas


Share






Ionut Arghire is an international correspondent for SecurityWeek.
Previous Columns by Ionut Arghire:
Juniper Networks Patches Vulnerabilities in Contrail Networking, Junos OS
Conti Ransomware Gang Claims Cyberattack on Wind Turbine Giant Nordex
New 'Enemybot' DDoS Botnet Targets Routers, Web Servers
Google Patches Third Actively Exploited Chrome Zero-Day of 2022
Cloud Security Startup DoControl Raises $30 Million


2022 Singapore/APAC ICS Cyber Security Conference]




2022 CISO Forum: September 13-14 - A Virtual Event




Virtual Event Series - Security Summit Online Events by SecurityWeek




2022 ICS Cyber Security Conference | USA [Hybrid: Oct. 24-27]


sponsored links

Tags:
 * NEWS & INDUSTRY
 * Cybercrime



View the discussion thread.


GET THE DAILY BRIEFING




     

 * Most Recent
 * Most Read

 * OHSU Apologizes After Phishing Test Draws Complaints
 * North Korea APT Lazarus Targeting Chemical Sector
 * Juniper Networks Patches Vulnerabilities in Contrail Networking, Junos OS
 * House Panels Probe Gov't Use of Facial Recognition Software
 * Conti Ransomware Gang Claims Cyberattack on Wind Turbine Giant Nordex
 * New 'Enemybot' DDoS Botnet Targets Routers, Web Servers
 * Google Patches Third Actively Exploited Chrome Zero-Day of 2022
 * U.S. Gov Blames North Korea Hackers for $600M Cryptocurrency Heist
 * Critical Code Execution Flaw Haunts VMware Cloud Director
 * Cloud Security Startup DoControl Raises $30 Million

Looking for Malware in All the Wrong Places?
First Step For The Internet's next 25 years: Adding Security to the DNS
Tattle Tale: What Your Computer Says About You
Be in a Position to Act Through Cyber Situational Awareness
Report Shows Heavily Regulated Industries Letting Social Networking Apps Run
Rampant
2010, A Great Year To Be a Scammer.
Don't Let DNS be Your Single Point of Failure
How to Identify Malware in a Blink
Defining and Debating Cyber Warfare
The Five A’s that Make Cybercrime so Attractive
How to Defend Against DDoS Attacks
Security Budgets Not in Line with Threats
Anycast - Three Reasons Why Your DNS Network Should Use It
The Evolution of the Extended Enterprise: Security Strategies for Forward
Thinking Organizations
Using DNS Across the Extended Enterprise: It’s Risky Business



POPULAR TOPICS

 * Cybersecurity News
 * IT Security News
 * Risk Management
 * Cybercrime
 * Cloud Security
 * Application Security
 * Smart Device Security


SECURITY COMMUNITY

 * Virtual Cybersecurity Events
 * Webcast Library
 * CISO Forum
 * ICS Cyber Security Conference
 * IT Security Newsletters
 * InfosecIsland.Com


STAY INTOUCH

 * Twitter
 * Facebook
 * LinkedIn Group
 * Cyber Weapon Discussion Group
 * RSS Feed
 * Submit Tip
 * Security Intelligence Group


ABOUT SECURITYWEEK

 * Team
 * Advertising
 * Event Sponsorships
 * Writing Opportunities
 * Feedback
 * Contact Us

Copyright © 2022 Wired Business Media. All Rights Reserved. Privacy Policy

Close This Window