» » Ransomware Attack Forces Canadian Mining Company to Shut Down Mill

Ransomware Attack Forces Canadian Mining Company to Shut Down Mill

Ransomware Attack Forces Canadian Mining Company to Shut Down Mill

Residence › Cybercrime

Ransomware Assault Forces Canadian Mining Firm to Shut Down Mill

By Ionut Arghire on January 03, 2023

Tweet

Canadian Copper Mountain Mining Company (CMMC) final week shut down its mill after falling sufferer to a ransomware assault.

Listed on the Toronto Inventory Alternate, the agency owns many of the Copper Mountain mine. Positioned in southern British Columbia, the mine produces a median of 100 million kilos of copper equal per yr.

In a cyber incident discover on its web site, CMMC introduced the shutdown of a few of its techniques, together with the mill, after falling sufferer to a ransomware assault on December 27, 2022.

“The corporate has remoted operations, switched to guide processes, the place doable, and the mill has been preventatively shutdown to find out the impact on its management system,” CMMC stated.

The mining agency introduced that it applied danger administration techniques and protocols instantly after discovering the cyberattack and that the related authorities are aiding with the investigation.

“There have been no security or environmental incidents because of the assault,” CMMC stated.

The corporate has not shared info on the kind of ransomware used within the assault, nor on how the attackers breached its techniques.

Based on a BleepingComputer report, nonetheless, stolen credentials may need been used for intrusion. Earlier in December, credentials belonging to a CMMC worker account have been being provided on the market on a hacker portal.

Associated: Ransomware Assault Causes Disruption at British Newspaper The Guardian

Associated: Rackspace Hit With Lawsuits Over Ransomware Assault

Associated: New Zealand Authorities Hit by Ransomware Assault on IT Supplier

Associated: Virginia County Confirms Private Info Stolen in Ransomware Assault

Get the Every day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Ransomware Assault Forces Canadian Mining Firm to Shut Down Mill
  • Google to Pay Indiana $20 Million to Resolve Privateness Go well with
  • CISA Says Two Previous JasperReports Vulnerabilities Exploited in Assaults
  • The 5 Tales That Formed Cybersecurity in 2022
  • A number of DoS, Code Execution Vulnerabilities Present in Rockwell Automation Controllers
  • Information Breach at Louisiana Healthcare Supplier Impacts 270,000 Sufferers
  • Netwrix Acquires Remediant for PAM Know-how
  • EarSpy: Spying on Cellphone Calls by way of Ear Speaker Vibrations Captured by Accelerometer
  • North Korean Hackers Created 70 Faux Financial institution, Enterprise Capital Agency Domains
  • Information of 400 Million Twitter Customers for Sale as Irish Privateness Watchdog Broadcasts Probe

In search of Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By means of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Tips on how to Establish Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Tips on how to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles