conti attacks Gleason Corporation

Incident Date:

March 4, 2022

World map



conti attacks Gleason Corporation


Gleason Corporation




Pero, Italy

Pero, Italy

First Reported

March 4, 2022

Ransomware Attack on Gleason Corporation

Company Overview

Gleason Corporation operates in the manufacturing sector, specializing in the development and construction of systems for all types of gears, including software for gear design and transmission, machines, tools, automation, and the production of plastic gears. The company is renowned for its Total Gear Solutions, encompassing software, machines, tools, automation, as well as the design and production of plastic gears.

Vulnerabilities and Targeting

The specific vulnerabilities that facilitated the successful attack on Gleason Corporation by the ransomware group Conti remain undisclosed. Conti, known for its ransomware malware, typically disseminates through malicious spam, suggesting the possibility that the attack was launched via a phishing email or a malicious link. This method could have exploited a gap in the company's email security protocols or in the cybersecurity awareness of its employees.

Impact and Response

The full extent of the damage inflicted by the ransomware attack on Gleason Corporation has not been detailed. It remains uncertain whether the company acquiesced to the ransom demands made by Conti or if they were able to restore their encrypted data through other means.

The ransomware attack on Gleason Corporation by the Conti group underscores the persistent cyber threat landscape within the manufacturing sector. It is imperative for companies to maintain vigilance and adopt comprehensive cybersecurity strategies to mitigate such risks.


Recent Ransomware Attacks

The Recent Ransomware Attacks (RRA) site acts as a watchtower, providing you with near real-time ransomware tracking of attacks, groups and their victims. Given threat actors’ overarching, lucrative success so far, ransomware attacks have become the most ubiquitous, and financially and informationally impactful cyber threat to businesses and organizations today.

The site’s data is generated based on hosting choices of real-world threat actors, and a handful of other trackers. While sanitization efforts have been taken, we cannot guarantee 100% accuracy of the data. Attack updates will be made as source data is reported by reputable sources. By viewing, accessing, or using RRA you acknowledge you are doing so at your own risk.