Skip to content

Richmond tech company hit by ransomware attack

A cyberattack halted a Richmond-based technology company for several days this week. Sierra Wireless discovered the ransomware attack, which targeted the company’s internal IT systems and corporate website, on Saturday.
ransomware
Richmond-based Sierra Wireless was hit with a ransomware attack earlier this month.

A cyberattack halted a Richmond-based technology company for several days this week.

Sierra Wireless discovered the ransomware attack, which targeted the company’s internal IT systems and corporate website, on Saturday. 

As a result, Sierra Wireless halted production at its manufacturing sites as it worked to recover from the attack.

The company, located near No. 6 Road and Westminster Highway, produces “Internet of Things” devices – physical devices that send or receive data or instructions – such as WiFi and cellular gateways and routers.

Customer products and services aren’t believed to have been impacted by the attack, according to a statement from Sierra Wireless. 

Sierra Wireless announced early Friday it had resumed production and has begun to recover its internal systems.

Once the company learned of the attack, its IT and operations teams “immediately implemented measures to counter the attack,” Sierra Wireless said in its statement.

The company also engaged with the cyber-security law firm Blake, Cassels and Graydon LLP and forensic investigation and cyber-incident response firm KPMG. Investigations into the ransomware attack are continuing.

“I’m proud of the efforts of our IT team and external advisors as they have mitigated the attack and made real progress in getting operations up and running. As the investigation continues, Sierra Wireless commits to communicating directly to any impacted customers or partners, whom we thank for their patience as we work through this situation,” said Sam Cochrane, Sierra Wireless’ chief financial officer who oversees its IT operations and supply chain.

The company said it doesn’t expect any product security patches, firmware or software updates are required as a result of the attack.