Siegfried pharmaceutical published a�statement on its web site on May 23: The Siegfried Group’s IT network has become the mark of a malware attack. The company immediately initiated extensive measures to ensure the safety of its employees and facilities at all times and to avert further damage. The base cause has been identified and the recovery of the systems has started. in the nighttime to Friday, May 21, 2021, an attempt with malware on Siegfried’s IT network was discovered by internal monitoring systems. As an immediate measure, output was shut down at various sites, network connections were interrupted and all IT systems were subjected to an in-depth investigation, which is currently allay ongoing. The safety of all employees and production facilities was guaranteed at all times. With the exception of the two sites in Spain, which operate on an isolated network, there will be varying degrees of production interruption at the other sites. Cooperation of internal and external specialists for IT infrastructure and security is running smoothly and efficiently. in the meantime, the root do has been identified and the recovery of the systems has started. This also includes the assessment by when the IT systems will be fully operational again. Although the firm says “malware” and doesn’t specifically mention “ransomware,” we may learn more in time and DataBreaches.net will update this post. But Broadway.me added i detail of mention in their coverage: The Siegfried production facility in Hameln, Germany was also affected by the attack. The Covid BioNTech vaccine, developed by the American pharmaceutical company Pfizer, was recently packaged there. Media spokesperson Peter Geller confirmed upon request: Production in Hamelin is also discontinued. But this morn weve position everything on the redress rail so we can scratch the systems up slowly again. However, since these programs take very complex check programs, it may take some time before production is fully ramped up. Additional material by dissent