conti attacks Cummins-Wagner

Incident Date:

March 6, 2022

World map



conti attacks Cummins-Wagner






Annapolis Junction, USA

Maryland, USA

First Reported

March 6, 2022

Cummins-Wagner Suffers Ransomware Attack

Company Overview

Cummins-Wagner is a leading distributor of industrial and mechanical equipment, including pumps, air compressors, and heat transfer equipment. They provide comprehensive services such as application engineering, system design, CAD rendering, equipment rebuilds, complete teardown, repair, and assembly, installation, start-up, and commissioning, preventive maintenance services, and parts ordering.

Vulnerabilities and Threats

Ransomware attacks can exploit various vulnerabilities in a company's systems, including outdated software, weak passwords, and unpatched security flaws. In the case of Cummins-Wagner, the attackers gained access to the company's systems and encrypted their data, demanding a ransom for its release.

Industry Impact

The manufacturing sector is a common target for ransomware attacks due to the critical nature of the data and systems involved. A successful attack can disrupt operations, cause financial losses, and damage the company's reputation.

Mitigation Strategies

To mitigate the risks of ransomware attacks, companies should implement robust cybersecurity measures, such as regular software updates, strong password policies, employee training, and backup and recovery plans.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.