Press "Enter" to skip to content

Ransomware attack Derails IoT Giant Sierra Wireless

A ransomware attack on the leading Internet of Things Giant Sierra Wireless has hampered its production activities. It resulted in the halt of its internal operations alongside a freeze on other activities. The Canadian multinational manufacturer develops a broad array of communications equipment,  including gateways, modems, routers, and cellular networks. The ransomware attack hit the IoT Giant Sierra Wireless foremostly on March 20 halting its production activities across its manufacturing sites.

The attack pushed the company’s IoT systems to go offline, and a large consumer base got affected by the temporary halt in the actions of Sierra Wireless. Sierra Wireless’s website and other internal operations have also been left staggered by the classified ransomware attack. The company’s website (sierrawireless.com) is currently down, saying “Site is under maintenance.” The company is working rigorously to integrate the IoT systems back online and averts the consumers that the services will be available at the facilities very soon.

“Once the company learned of the attack, its IT and operations teams immediately implemented measures to counter the attack in accordance with established cybersecurity procedures and policies that were developed in collaboration with third-party advisors,” according to Sierra Wireless.

Due to the constant interruptions in the company’s activities, IoT Giant Sierra Wireless is withdrawing its first-quarter 2021 guidance. At this time, Sierra Wireless didn’t comment on how did the cyber attack initially got enforced into the system, and what type of ransom was demanded by the cybercriminals.

Sierra Wireless operates a single-handled global network operation center (NOC), and research and development centers across Asia, Europe, and North America. Sierra declined to comment further regarding the solution of the ransomware attacks and asserted that the company’s policy does not abide them to share the protocol for dealing with ransomware attacks.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *