[ad_1]

ScanSource sign

Technology provider ScanSource has announced that it has been the victim of a ransomware attack affecting some of its systems, business operations and customer portals.

ScanSource is a US-based cloud service and SaaS network connectivity and communication provider that also offers special solutions for PoS (point of sale) and payment, security and AIDC (automatic identification and data capture ).

The company also owns cloud service provider and education platform Intelisys, as well as cloud distributor and managed service provider intY.

Beginning around May 15, ScanSource customers contacted BleepingComputer saying they no longer had access to the company’s customer portals and websites, fearing they had suffered a cyberattack.

Yesterday, ScanSource confirmed that it suffered a ransomware attack on May 14, 2023 that affected some of its systems.

The company has begun to implement its incident response plan, including alerting law enforcement and bringing in forensic and cybersecurity professionals.

These experts are assisting with the ongoing investigation and helping to implement strategies to minimize operational disruptions caused by the incident.

The impact of the cyberattack was significant, as the company warns that there will be delays in providing services to customers in the coming period, which is expected to affect operations in North America and Brazil.

“The company is working diligently to bring affected systems back online, while mitigating the impact to its business,” reads the statement. Press release.

“ScanSource regrets any inconvenience or business delay this may cause to customers and suppliers in North America and Brazil and appreciates their patience.”

Tech company is a Fortune 1000 entity listed on NASDAQ, where its stock price fell 1.42% today, likely following the disclosure of the cyberattack.

At the time of publication, it is unclear which ransomware operation is behind the attack or if any data was stolen.

BleepingComputer has contacted ScanSource to request more details about the ransomware attack, and we’ll update this post when we hear more.

[ad_2]

Source link