Fixed Intel
Aggregated IntelIndustry News

Energy and Water Management Firm Itron Hacked

Itron, which serves utilities and cities around the world, discovered unauthorized access to its systems on April 13.

FIFixed Intel Team||2 min read|2 Views
Energy and Water Management Firm Itron Hacked

Aggregated from SecurityWeek

This article was automatically aggregated from an external source. Content may be summarized.

Read Original

Full Analysis

US-based energy and water management solutions provider Itron has launched an investigation after hackers gained access to some of its systems.

Itron helps utilities and cities manage energy, water, and other services, serving more than 8,000 customers across 100 countries. 

The company has revealed in an SEC filing that it detected unauthorized access to some systems on April 13, but noted that “operations have continued in all material respects”.

“The Company took action to remediate and remove the unauthorized activity and has not observed any subsequent unauthorized activity within its corporate systems. Further, no unauthorized activity was observed in the customer hosted portion of its systems,” Itron said.

The attacker’s motivation and whether any customer or other sensitive information may have been compromised remains unclear.

No known ransomware or extortion group appears to have taken credit for hacking Itron.

Advertisement. Scroll to continue reading.

The company said it expects a significant portion of incident response costs to be covered by insurance. In addition, Itron does not expect the hack to have a material impact.

“The Company is evaluating what legal filings and regulatory notifications might be required because of this incident and intends to take appropriate action based on its review and findings,” Itron said.

Related: Nightclub Giant RCI Hospitality Reports Data Breach

Related: $3.6 Million Stolen in Bitcoin Depot Hack

Related: Luxury Cosmetics Giant Rituals Discloses Data Breach

Related: RTX Confirms Airport Services Hit by Ransomware


Originally published by SecurityWeek

Original Source

SecurityWeek