US sensor giant Sensata admits ransomware derailed ops

#### [Cyber-crime](/security/cyber_crime/)US sensor giant Sensata admits ransomware derailed ops======================================================Props for the transparency though———————————[Connor Jones](/Author/Connor-Jones ‘Read more by this author’) Thu 10 Apr 2025 // 18:03 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops) [](https://twitter.com/intent/tweet?text=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&summary=Props%20for%20the%20transparency%20though) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) US sensor maker Sensata has told regulators that a ransomware attack caused an operational disruption, and that it’s still working to fully restore affected systems.Sensata, which raked in $4 billion in revenue in 2023, said the ransomware attack took place on April 6 and has encrypted ‘certain devices’ on its network. The biz offers sensors, ‘sensor-rich solutions,’ and electrical protection kits used in mission-critical systems, and it boasts it ships ‘over a billion’ devices a [year](https://www.sensata.com/sites/default/files/a/sensata-fact-sheet.pdf) -[PDF-].The Attleboro, MA-headquartered company, whose products are used in a variety of contexts including electric vehicles, airplanes, renewable energy, and industrial equipment, actually mentioned the word ‘ransomware’ in its [Form 8-K](https://www.sec.gov/ix?doc=/Archives/edgar/data/1477294/000147729425000047/st-20250406.htm). It’s a welcome rarity when it comes to [cyber incident disclosures](https://www.theregister.com/2025/04/02/oracle_breach_disaster_planning/), although there is nothing on its website or social media pages highlighting the ongoing technical difficulties. ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cybercrime&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z_gVrUjgJhf3aqjmsz0vbAAAANI&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0)In the form, Sensata confirmed its operations are temporarily affected, including ‘shipping, receiving, manufacturing production, and various other support functions.’ ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cybercrime&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z_gVrUjgJhf3aqjmsz0vbAAAANI&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0)The outfit says it implemented containment measures – including proactively taking its network offline – launched an investigation with the help of third-party cybersecurity professionals, and rolled out interim measures to get some functions back online. But there’s no word yet on how well that’s going, or when full operations will resume.* [Crimelords at Hunters International tell lackeys ransomware too ‘risky’](https://www.theregister.com/2025/04/02/hunters_international_rebrand/)* [North Korea’s fake tech workers now targeting European employers](https://www.theregister.com/2025/04/02/north_korean_fake_techies_target_europe/)* [Attackers swipe data of 500k+ people from Pennsylvania teachers union](https://www.theregister.com/2025/03/19/pennsylvania_nonprofit_cyberattack/)* [Cybercrims now licking stamps and sending extortion demands in snail mail](https://www.theregister.com/2025/03/05/snail_mail_data_release_extortion/)It sounds like a classic double extortion scenario: devices were encrypted, and evidence files were taken – though the full scope of that is still under review. While this is standard operating procedure for most ransomware gangs, there’s no clear indication yet of who’s behind the attack.No group has claimed responsibility for the attack at the time of writing, but typically it doesn’t take long for the the first threats of data leakage to be made after regulators and the public are informed. This is usually seen as a signal to the criminals that the victim isn’t willing to meet the ransom demands.The double extortion model hinges on the criminals’ bet that a victim will pay to keep things quiet and avoid reputational fallout. If they cave and cough up the ransom, they’re promised a decryption key and assurances their stolen data won’t be leaked, although events [don’t usually conclude as simply as that](https://www.theregister.com/2024/09/11/ransomware_decryptor_not_working/). Decryption tools can fail, and even if data isn’t published, there’s no reason to believe the crooks actually deleted their copies. ![](https://pubads.g.doubleclick.net/gampad/ad?co=1&iu=/6978/reg_security/cybercrime&sz=300×50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z_gVrUjgJhf3aqjmsz0vbAAAANI&t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0)As for what files were stolen exactly, that still remains to be seen. Investigators likely have a vague idea but confirming everything takes time, and investigations into the stolen files remain ongoing.Sensata filed its disclosure with the Securities and Exchange Commission (SEC) on April 9, and at the time of filing, it said it didn’t expect the ransomware attack to have a material impact on its upcoming financial results for the three months ended June 30, 2025. However, it added that the ‘full scope and impact of this incident is not yet known and could result in a future determination that the incident will be material to the Company’s financial statements and results of operations.’Originally founded in 1916 as General Plate Company, a supplier to the jewelry industry, the business evolved through several corporate owners before becoming Sensata Technologies in 2006, following Bain Capital’s acquisition of Texas Instruments’ sensors and controls division.Now, it manufactures an extensive array of sensors for various use cases. It produces pressure sensors, relays, temperature sensors, circuit breakers, tire management sensors, and more.Given its importance in the supply chains of many industries such as aerospace, construction, defense, HVAC, manufacturing, and others, Sensata is exactly the type of company ransomware gangs love to target.If its operational disruptions continue for an extended period, the issues will then reverberate down the supply chains, putting pressure on the company to find a quick resolution. The crooks will, of course, use that as leverage to encourage it to [pay their ransom demands](https://www.theregister.com/2025/01/14/uk_ransomware_payout_ban/). ® [Sponsored: Don’t let cyberattacks keep you down](https://go.theregister.com/tl/3147/shttps://www.theregister.com/2025/04/02/dont_let_cyberattacks_keep_you/) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops) [](https://twitter.com/intent/tweet?text=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&summary=Props%20for%20the%20transparency%20though) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [Ransomware](/Tag/Ransomware/)* [Supply Chain](/Tag/Supply%20Chain/) More like these × ### More about* [Ransomware](/Tag/Ransomware/)* [Supply Chain](/Tag/Supply%20Chain/) ### Narrower topics* [REvil](/Tag/REvil/)* [Supply Chain Security Week](/Tag/Supply%20Chain%20Security%20Week/)* [Wannacry](/Tag/Wannacry/) ### Broader topics* [Security](/Tag/Security/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops) [](https://twitter.com/intent/tweet?text=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=US%20sensor%20giant%20Sensata%20admits%20ransomware%20derailed%20ops&summary=Props%20for%20the%20transparency%20though) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/04/10/us_sensor_giant_sensata_ransomware/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) POST A COMMENT #### More about* [Ransomware](/Tag/Ransomware/)* [Supply Chain](/Tag/Supply%20Chain/) More like these × ### More about* [Ransomware](/Tag/Ransomware/)* [Supply Chain](/Tag/Supply%20Chain/) ### Narrower topics* [REvil](/Tag/REvil/)* [Supply Chain Security Week](/Tag/Supply%20Chain%20Security%20Week/)* [Wannacry](/Tag/Wannacry/) ### Broader topics* [Security](/Tag/Security/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### Ransomware crews add ‘EDR killers’ to their arsenal — and some aren’t even malwareinterview Crims are disabling security tools early in attacks, Talos saysDisaster Recovery Week10 days -| 1](/2025/03/31/ransomware_crews_edr_killers/?td=keepreading) [#### Heterogeneous stacks, ransomware, and ITaaS: A DR nightmareComment Recovery’s never been harder in today’s tangled, outsourced infrastructureDisaster Recovery Week7 days -| 6](/2025/04/03/heterogeneity_itaas_ransomware_disaster_recovery/?td=keepreading) [#### Crimelords at Hunters International tell lackeys ransomware too ‘risky’Bosses say theft now the name of the game with a shift in tactics, apparent brandingCyber-crime8 days -| 6](/2025/04/02/hunters_international_rebrand/?td=keepreading) [#### Building a better digital future for SMEsHow smaller businesses can grab the opportunities that AI and advanced collaboration and connectivity tools give themSponsored Feature](/2025/03/26/building_a_better_digital_future/?td=keepreading) [#### Security shop pwns ransomware gang, passes insider info to authoritiesResearchers say ‘proactive’ approach is needed to combat global cybercrimeSecurity14 days -| 7](/2025/03/27/security_shop_pwns_ransomware_gang/?td=keepreading) [#### That massive GitHub supply chain attack? It all started with a stolen SpotBugs tokenBut this mystery isn’t over yet, Unit 42 opinesDevops3 days -| 7](/2025/04/07/github_supply_chain_attack/?td=keepreading) [#### Ransomwared NHS software supplier nabs £3M discount from ICO for good behaviorData stolen included checklist for medics on how to get into vulnerable people’s homesCyber-crime14 days -| 3](/2025/03/27/ransomwared_nhs_software_supplier_nabs/?td=keepreading) [#### VanHelsing ransomware emerges to put a stake through your Windows heartThere’s only one rule — don’t attack Russia, duhResearch16 days -| 7](/2025/03/25/vanhelsing_ransomware_russia/?td=keepreading) [#### Trump tariffs to make prices great — a gainWorld War Fee As costs for US shoppers set to rise, markets slump, orange is new red, we speak to economic expertsPublic Sector3 days -| 78](/2025/04/07/trump_tariffs_make_prices_greater/?td=keepreading) [#### Too many software supply chain defense bibles? Boffins distill adviceHow to avoid another SolarWinds, Log4j, and XZ Utils situationSecurity21 days -| 10](/2025/03/20/software_supply_chain_defense/?td=keepreading) [#### Cyber-crew claims it cracked American cableco, releases terrible music video to prove itWOW*!* DID*!* SOMEONE*!* REALLY*!* STEAL*!* DATA*!* ON*!* 400K*!* USERS?*!*Cyber-crime14 days -| 7](/2025/03/28/arkana_wow_ransomware/?td=keepreading) [#### As nation-state hacking becomes ‘more in your face,’ are supply chains secure?Interview Ex-US Air Force officer says companies shouldn’t wait for govt mandatesCSO17 days -| 10](/2025/03/24/nation_state_supply_chain_attack/?td=keepreading)

Related Tags:
NAICS: 81 – Other Services (except Public Administration)

NAICS: 336 – Transportation Equipment Manufacturing

NAICS: 541 – Professional

Scientific

Technical Services

NAICS: 92 – Public Administration

NAICS: 33 – Manufacturing – Metal

Electronics And Other

NAICS: 928 – National Security And International Affairs

NAICS: 813 – Religious

Grantmaking

Civic

Professional Services

Similar Services

Sodinokibi

REvil

Associated Indicators: