Sierra Wireless Revealed that its Internal IT Systems were Hit by a Ransomware Attack


Sierra Wireless, a Canadian IoT company, announced on Tuesday that its internal IT systems were targeted by ransomware on March 20.

Sierra Wireless is a company that specialises in developing and producing wireless communication equipment. Their products are used in a variety of industrial and business settings around the world, including commercial buildings, communications, government, electricity, transportation, and water.

Sierra Wireless said the ransomware forced it to suspend production at its factories, but it expects to resume production “soon.” While the company’s website and other internal operations have been affected, the company claims the attack has only impacted its own systems, stating that it “maintains a strong distinction between its internal IT systems and customer facing goods and services.”

The company said in a press release that “as soon as the company learned of the threat, its IT and operations teams immediately introduced steps to counter the attack in compliance with existing cybersecurity protocols and policies that were developed in consultation with third-party advisors.” “These teams believe they have solved the attack with the support of these and other third-party consultants, and are actively working to get Sierra Wireless‘ internal IT systems back online.”

The Securities and Exchange Commission (SEC) in the United States has also been informed of the incident. The organisation has had to remove its Q1 2021 guidance due to the ransomware’s disruption.

At the time of publishing, Sierra Wireless’ website was still unavailable. Ransomware attacks on major corporations are not rare, and they often cause production processes to be disrupted. Attacks on beer conglomerate Molson Coors and packaging behemoth WestRock are two recent examples.

Melina Richardson
Melina Richardson is a Cyber Security Enthusiast, Security Blogger, Technical Editor, Certified Ethical Hacker, Author at Cybers Guards. Previously, he worked as a security news reporter.