DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Palfinger Group crippled by massive attack

Posted on January 25, 2021 by Dissent

As seen on the home page of their  web site:

PALFINGER Group is currently the target of an ongoing global cyber attack. IT infrastructure is disrupted at the moment (including sending and receiving emails, ERP systems). A large proportion of the group’s worldwide locations are affected. It is not possible to estimate the precise extent and duration of the attack or its consequences at this time. Work is being carried out intensively on a solution.

ABOUT PALFINGER AG

PALFINGER is an international technology and mechanical engineering company and the world’s leading provider of innovative crane and lifting solutions. With over 11,000 employees, 35 locations and a worldwide sales and service network with over 5,000 service points, PALFINGER guarantees customers immediate and optimal proximity.

With its future-proof complete and product solutions, PALFINGER, as a technology leader puts benefits reaped by the customer at the center of its innovation efforts. Consistent digitalization and the use of the latest technologies increase: operator safety and comfort, operational capability and service life, thus ultimately contributing to the corporate success of its customers and partners.

As a global company with strong regional roots, PALFINGER knows that sustainable thinking and behavior contribute significantly to economic success. For this reason, the company assumes social, environmental and economic responsibility along the entire supply chain.

PALFINGER AG has been listed on the Vienna Stock Exchange since 1999 and generated sales of EUR 1.75 billion in 2019.

For further information please contact:

Hannes Roither | Company Spokesperson | PALFINGER AG T +43 662 2281-81100 | [email protected]

This text and the corresponding images are available under “News” at PALFINGER’s website www.palfinger.ag, www.palfinger.com.

h/t, @Chum1ng0, who also sent along this screenshot from Palfinger’s site as seen at https://www.palfinger.com/es-cl

Notice on Palfinger's Site


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Gatineau gymnastics centre warns members of possible data breach
  • Data breach in 42 Latvian municipalities: DVI imposes 300,000 euro fine on ZZ Dats
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Breach IncidentsBusiness SectorMalwareNon-U.S.

Post navigation

← Australia’s securities regulator says server hit by cyber security breach
Tennessee Wesleyan University systems recovering after Friday ransomware attack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.