1 min read

Australian Beverage Manufacturer Shutdown IT Systems After Cyberattack

Alina BÎZGĂ

June 11, 2020

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Australian Beverage Manufacturer Shutdown IT Systems After Cyberattack

A cyberattack forced Australian beverage manufacturer Lion to shut down its IT system, interrupting manufacturing and orders, the company disclosed on June 9.

“We immediately shut down all our systems as a precaution, and we have continued to work with cyber experts to determine how much longer our systems will be impacted,” the company said.

While there is no evidence of a data breach, the company is still investigating the incident that halted its brewery output across the country. To continue serving customers and partners, Lion adopted manual systems to receive and process orders.

“This attack could not have come at a worse time for Lion, particularly for our valued pub and club customers who are in the very early stages of recovery following the COVID-19 closures,”said company officials. “In the Dairy & Drinks business, some parts of customer service still remain offline and whilst we are operating across most of our manufacturing network, due to the nature of fresh dairy and juice products there have been some service misses in some customer channels as we have worked to manually key and pick orders.”

Making matters worse, the disruption of business follows a major IT upgrade project that spanned across a two-year period. The technological enhancement implied centralizing the company”s 500 applications into one cloud-based platform.

No additional information was provided, but the possibility of ransomware attack can”t be excluded.

This is not the first malicious attack to affect an Aussie business this year. Toll, a leading transportation company, was hit by two ransomware attacks, in which malicious actors managed to steal sensitive information and disrupt business operations. Additionally, BlueScope Steel suffered a company-wide cease of production after a ransomware attack at their US-based facilities.

Malicious actors are on top of their game and continue to wreak havoc worldwide. It has become critical for organizations and businesses to make sure that their IT systems and networks are protected from cyber threats while also ensuring that their remote workforce follows good cyber hygiene patterns.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read