Baker & Taylor, one of the world’s largest distributors of books worldwide, suffered a ransomware attack on August 23. The incident impacted the company’s phone systems, offices, and service centers.
On August 24, the company announced that the attack caused disruptions to its business-critical systems, and its technical staff is working on restoring impacted servers.
“Thank you again for your patience, kind words, and partnership as we recover from last week’s ransomware attack. Our team has been working around the clock to return to normal operations.” Baker & Taylor said in an update published on August 29. “Our priority has been remediating our systems and ensuring they are sanitized. As that work is completed, our focus is transitioning to restoration, bringing our systems online, and returning to operations in a phased approach. We expect disruptions to continue this week but are hopeful we can provide timelines for individual systems and applications as the week progresses. Thank you for your understanding.”
At this time, the company did not reveal the name of the ransomware family that infected its systems or if the threat actors have stolen its data.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Baker & Taylor)
[adrotate banner=”5″]
[adrotate banner=”13″]
As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…
Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…
Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…
A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …
CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…
U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…
This website uses cookies.