- The manufacturer of American sensors Sensata confirms the suffering of a ransomware attack
- He also confirmed the loss of sensitive files
- An investigation is currently underway
Sensata, a large manufacturer of American sensors, has undergone a ransomware attack which paralyzed parts of its operations.
In a new 8-K form filed with the Securities and Exchange Commission (SEC) of the United States, Sensata said that he had experienced an “ransomware incident which quantified certain devices” in its network.
The attack “temporarily affected” the operations of the company, the deposit of states, in particular the shipment, the reception, the production of manufacturing and “various other support functions”.
Hours to attack
After identifying the intrusion, the company has activated its response protocols, which include putting on the outlet of its network, calling on third -party legal medicine experts, as well as the notification of the competent authorities.
Sensata said he was currently investigating the attack and that he has no calendar at the time he could resume operations as usual.
The company also said that it had lost files in the attack, but did not detail which one and what was on them.
“The company strives to identify and review the files involved and take additional measures, if necessary, depending on its examination, in particular informing individuals and regulatory authorities in accordance with applicable law,” he said in the file.
Sensata also said that it did not expect the incident to have a significant impact on its financial results and operations for the three months ending on June 30, 2025: “However, the complete scope and impact of this incident are not yet known and could cause future determination that the incident will be important for the financial statements and the results of the company’s exploitation.”
Currently, no threat player has assumed the responsibility of the attack, but the name of Sensata may appear on a data leak website, as this is also part of the pressure tactics that the hackers use so that the victim pays the ransom request.
Via The register




