conti attacks Gleason Corporation
Incident Date:
March 4, 2022
Overview
Title
conti attacks Gleason Corporation
Victim
Gleason Corporation
Attacker
Conti
Location
First Reported
March 4, 2022
Ransomware Attack on Gleason Corporation
Company Overview
Gleason Corporation operates in the manufacturing sector, specializing in the development and construction of systems for all types of gears, including software for gear design and transmission, machines, tools, automation, and the production of plastic gears. The company is renowned for its Total Gear Solutions, encompassing software, machines, tools, automation, as well as the design and production of plastic gears.
Vulnerabilities and Targeting
The specific vulnerabilities that facilitated the successful attack on Gleason Corporation by the ransomware group Conti remain undisclosed. Conti, known for its ransomware malware, typically disseminates through malicious spam, suggesting the possibility that the attack was launched via a phishing email or a malicious link. This method could have exploited a gap in the company's email security protocols or in the cybersecurity awareness of its employees.
Impact and Response
The full extent of the damage inflicted by the ransomware attack on Gleason Corporation has not been detailed. It remains uncertain whether the company acquiesced to the ransom demands made by Conti or if they were able to restore their encrypted data through other means.
The ransomware attack on Gleason Corporation by the Conti group underscores the persistent cyber threat landscape within the manufacturing sector. It is imperative for companies to maintain vigilance and adopt comprehensive cybersecurity strategies to mitigate such risks.
Sources
Recent Ransomware Attacks
The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.
The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.