Security

Major energy contractor reports 'limited' access to IT after ransomware locks files

ENGlobal customers include the Pentagon as well as major oil and gas producers


American energy contractor ENGlobal disclosed that access to its IT systems remains limited following a ransomware infection in late November.

In a Monday filing with the US Securities and Exchange Commission (SEC), the company said it became aware of a cybersecurity incident on November 25 after criminals broke into its networks and locked up some of its files. 

"While the investigation and remediation efforts remain ongoing, access to the company's IT system is limited to essential business operations," according to the Form 8-K filing.

The Form 8-K filing doesn't specify how much and what type of data the crooks got their hands on, stating only that an investigation revealed they had "illegally accessed the company's IT system and encrypted some of its data files," but it's worth noting that ENGlobal has several high profile customers including the US Department of Defense and Department of Energy, as well as private companies that produce fuel and gas. 

ENGlobal provides engineering, automation, and construction services for these critical infrastructure sectors. This makes it a high value target for extortionists, both for the sensitive information it houses and also because digital crooks know that major corporations providing critical services are more likely to pay a ransom demand to keep their operations up and running and to protect their customers' data.

ENGlobal did not immediately respond to The Register's inquiries about the attack. 

Upon detecting the intruders, the company says it "immediately took steps to contain, assess and remediate the cybersecurity incident, including beginning an internal investigation, engaging external cybersecurity specialists, and restricting access to its IT system."

There's no word yet on when ENGlobal expects to restore full access to these systems, and it hasn't determined if the ransomware attack will have any material impact on its finances or hurt its operations.

ENGlobal reported $39 million in revenue last year.

This latest cybercrime comes as critical orgs across the US and the UK have come under increasing attack from online gangs.

Late last month a ransomware crew threatened to leak data stolen from one of England's top children's hospitals: Liverpool's Alder Hey Children's Hospital and Liverpool Heart and Chest Hospital NHS Foundation Trust.

In October, American Water stopped issuing bills and took its MyWater app offline while it investigated a cyberattack on its systems. The major provider supplies water to over 14 million people in the US and numerous military bases. ®

Send us news
11 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Iran-linked crew used custom 'cyberweapon' in US critical infrastructure attacks

IOCONTROL targets IoT and OT devices from a ton of makers, apparently

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

How Chinese insiders are stealing data scooped up by President Xi's national surveillance system

'It's a double-edged sword,' security researchers tell The Reg

China's Salt Typhoon recorded top American officials' calls, says White House

No word yet on who was snooped on. Any bets?

Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket

ShinyHunters-linked heist thought to have been ongoing since March

Microsoft: Another Chinese cyberspy crew targeting US critical orgs 'as of yesterday'

Redmond threat intel maven talks explains this persistent pain to The Reg