DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Supernus Pharmaceuticals : Targeted in Ransomware Incident – Form 8-K

Posted on November 26, 2021 by Dissent

ROCKVILLE, Md., Nov. 24, 2021 — Supernus Pharmaceuticals, Inc. (NASDAQ: SUPN), a biopharmaceutical company, today announced that it was the recent target of a ransomware attack. The attack had no significant impact on the business and did not cause any serious disruption to the Company’s operations. The Company continues to operate without interruption and does not currently anticipate paying any ransom amounts to any criminal ransomware group.

The Company currently believes the incident began around mid-November, 2021. Based on the preliminary results of the ongoing investigation, the Company believes the criminal ransomware group encrypted certain files on the Company’s systems, deployed malware to impede access to the Company’s systems, and thereafter threatened to publish certain data copied from the Company’s systems. Upon detection of the ransomware, the Company notified government authorities, engaged cybersecurity experts and its outside law firm, and commenced its recovery process. The Company successfully recovered the impacted files and has taken additional steps designed to further protect its networks and files.

To date, the Company has not paid any ransom and has been able to restore all of the information encrypted by the criminal ransomware group.

Although to date the Company’s business and operations have not been significantly impacted by the incident, there is no assurance that further attacks may not significantly impact the Company’s business or operations and that information improperly obtained by the criminal ransomware group may not be exploited by the criminal ransomware group or other third parties. The Company will take appropriate action to protect any stolen confidential information and will continue to investigate the incident and monitor the situation going forward.

About Supernus Pharmaceuticals, Inc.

Supernus Pharmaceuticals is a biopharmaceutical company focused on developing and commercializing products for the treatment of central nervous system (CNS) diseases.

Our diverse neuroscience portfolio includes approved treatments for epilepsy, migraine, ADHD, hypomobility in Parkinson’s disease, cervical dystonia and chronic sialorrhea. We are developing a broad range of novel CNS product candidates including new potential treatments for hypomobility in Parkinson’s disease, epilepsy, depression and rare CNS disorders.

For more information, please visit www.supernus.com.

Source: Supernus Pharmaceuticals

Update:  This incident has been listed on the Hive threat actors’ dark web leak site. They claim to have encrypted the files on November 14 and to have infiltrated 1.5 TB of data. The rest of their statement appears incorrect in suggesting that Supernus covered up the incident from the SEC. To the contrary, Supernus issued the press release incorporated above in this post, and in its SEC filing of November 26, it pointed to the press release and linked to it. Although the threat actors claim that the firm was in negotiations with them, the firm makes no mention that it ever negotiated with them, and only mentions that it had not paid any ransom (as of November 24).

Dark web listing
Image: DataBreaches.net
Category: Business SectorMalware

Post navigation

← Class Certification Order Lifted in Data Breach Lawsuit Against West Virginia University Health System
Swire Pacific Offshore reports cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.