Last week, on July 23, smartwatch and wearable device maker Garmin had to shut down some of its connected services and call centers following a ransomware attack.
A few days after the outage, the company admitted it was the victim of a “cyber attack that encrypted” some of its systems.
Today the company announced that its computer networks were restored after the security incident.
“We are happy to report that many of the systems and services affected by the recent outage, including Garmin Connect, are returning to operation,” reads a statement published by the company on its website.
“Some features still have temporary limitations while all of the data is being processed. We’d like to thank all of our customers for your patience and understanding.”
At the time of writing, the company continues to point out that it is not aware of data theft during the ransomware attack.
The company confirmed that Garmin Connect customer data were not lost during the outage because they were stored on the device and will be available on the Garmin Connect after a synchronization.
The company confirmed that inReach SOS and messaging remained fully functional and were not impacted by the security incident.
Garmin Aviation systems are fully functional, including Pilot Apps, flyGarmin, Connext Services, FltPlan.com.
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
This website uses cookies.