German wind turbine producer, Nordex Group, was hit by a cyber-attack on 31 March 2022, with an update issued by the company this 7 days.
The cyber-attack was detected by IT security group at an early phase, according to Nordex, and reaction measures were taken quickly.
Nordex uncovered that the vital reaction protocols had been taken and IT units across numerous areas and enterprise models have been shut down.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
In a statement, the corporation stated: “To safeguard buyer property, distant obtain from Nordex Team IT infrastructure was disabled for turbines beneath contract.
“Nordex turbines continued running without the need of restrictions and wind farm interaction with grid operators and power traders was, and continues to be, unaffected.”
Nordex implemented choice remote command services for the majority of its fleet.
Inside and exterior IT professionals are at this time investigating the cyber-attack, with preliminary benefits suggesting that the cyber-attack only influenced interior IT infrastructure.
“There is no sign that the incident unfold to any third-party assets or in any other case beyond Nordex’s inside IT infrastructure,” Nordex explained in its assertion.
The corporation is currently restoring IT systems and warned that the shutdown may possibly have an impact on buyers, workers and other stakeholders.
The expanding use of green electrical power is most likely to turn into an significantly tempting concentrate on for cyber-criminals more than the coming decades. Very last November, world’s greatest producer of wind turbines, Vestas Wind Methods, was pressured to shut down IT techniques throughout numerous areas more than the weekend after a cybersecurity incident.
Some components of this short article are sourced from:
www.infosecurity-journal.com