DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Palfinger Group crippled by massive attack

Posted on January 25, 2021 by Dissent

As seen on the home page of their  web site:

PALFINGER Group is currently the target of an ongoing global cyber attack. IT infrastructure is disrupted at the moment (including sending and receiving emails, ERP systems). A large proportion of the group’s worldwide locations are affected. It is not possible to estimate the precise extent and duration of the attack or its consequences at this time. Work is being carried out intensively on a solution.

ABOUT PALFINGER AG

PALFINGER is an international technology and mechanical engineering company and the world’s leading provider of innovative crane and lifting solutions. With over 11,000 employees, 35 locations and a worldwide sales and service network with over 5,000 service points, PALFINGER guarantees customers immediate and optimal proximity.

With its future-proof complete and product solutions, PALFINGER, as a technology leader puts benefits reaped by the customer at the center of its innovation efforts. Consistent digitalization and the use of the latest technologies increase: operator safety and comfort, operational capability and service life, thus ultimately contributing to the corporate success of its customers and partners.

As a global company with strong regional roots, PALFINGER knows that sustainable thinking and behavior contribute significantly to economic success. For this reason, the company assumes social, environmental and economic responsibility along the entire supply chain.

PALFINGER AG has been listed on the Vienna Stock Exchange since 1999 and generated sales of EUR 1.75 billion in 2019.

For further information please contact:

Hannes Roither | Company Spokesperson | PALFINGER AG T +43 662 2281-81100 | [email protected]

This text and the corresponding images are available under “News” at PALFINGER’s website www.palfinger.ag, www.palfinger.com.

h/t, @Chum1ng0, who also sent along this screenshot from Palfinger’s site as seen at https://www.palfinger.com/es-cl

Notice on Palfinger's Site


Related:

  • PowerSchool commits to strengthened breach measures following engagement with the Privacy Commissioner of Canada
  • Hungarian police arrest suspect in cyberattacks on independent media
  • Two more entities have folded after ransomware attacks
  • British institutions to be banned from paying ransoms to Russian hackers
  • Data breach feared after cyberattack on AMEOS hospitals in Germany
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
Category: Breach IncidentsBusiness SectorMalwareNon-U.S.

Post navigation

← Australia’s securities regulator says server hit by cyber security breach
Tennessee Wesleyan University systems recovering after Friday ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.