Back to Ransomware

Ransomware

Denmark-based pump solutions victim of a cyberattack

Danish pump manufacturer, DESMI, revealed that it was a victim of a ransomware attack. The incident happened at night between April 7 and April 8, with the attacker leaving a ransom note. CEO Henrik Sørensen confirmed that DESMI has no plans to pay the ransom.

The aftermath

As soon as the attack was detected, the company hired third-party cybersecurity experts to investigate the attack and assist with restoring IT services. Fortunately, their enterprise resource planning (ERP) and finance systems were not compromised. DESMI’s production sites in China, India, America, and Denmark are up and running with no disturbances. The full extent of the attack is still unknown. DESMI has reported the incident to the authorities. It is in the process of notifying its customers and business partners about the breach.

“COVID-19 and now [a] cyberattack. 2020 will definitely be a year never to forget, but again we appreciate the support and understanding from customers and business partners from all over the world. Furthermore, we are happy to see that pumps and systems can be produced again so that our customers can receive their products – and we can get back to normal and focus on serving our many customers,” concludes Henrik Sørensen.

ManageEngine DataSecurity Plus to secure data and mitigate ransomware attacks. Download a free, 30-day trial of DataSecurity Plus today.

How ManageEngine can help.

Investing in a ransomware detection tool helps you detect and respond to ransomware attacks in real time to minimize the impact on your organization. Here are some best practices DataSecurity Plus can help you implement to handle ransomware attacks.

  • Detect ransomware with real-time mass access alerts. Monitor the frequency of file modifications by a user, and issue alerts whenever the number of modifications crosses a threshold within a specified time.
  • Quarantine ransomware and shut down infected devices with a customizable and automated response system. Set automated alert responses through the execution of a batch file to respond to mass access alerts.
  • View in-depth details of events for further investigation. Generate customizable, audit-ready reports on all file-related changes, access attempts, and share permissions.

Learn more about the eight best practices that can help you avoid cyberattacks and protect your organization. Start your free, 30-day trial of DataSecurity Plus today.

Share:

Latest DoS and DDoS attacks

Latest Brute force attack

Latest Crypto ransomware

Latest Advanced persistent threat (APT)

Compliance violation

Stay In The Know

Subscribe to our digest to get your weekly dose of cyber security updates straight to your inbox.

Please enter a business email id
 

By clicking 'I’m interested', you agree to processing of personal data according to the Privacy Policy

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

+

Stay In The Know

Thank you

You will receive weekly cybersecurity news soon!

  • Please enter a business email id
  •  
  •  
    By clicking 'I'm Interested', you agree to processing of personal data according to the Privacy Policy.