Hanzestrohm quickly operational again after cyberattack

Hanzestrohm has been struck by a ransomware attack on the night of August 5-6, 2023. Ransomware is malicious software that “holds hostage” files on computers and similar devices, rendering the files unavailable. Sometimes the held files are released after a payment is made to the hacker.

Thanks to the swift action of the IT colleagues all backups have been restored and all affected systems are now functioning properly. Hanzestrohm is operational as usual.

Hanzestrohm has designated the attack as a data breach as referred to in privacy legislation and has therefore submitted a data breach notification to the Dutch Data Protection Authority and to those directly involved.

Stay Alert

Despite appropriate action and the engagement of external forensic experts, we unfortunately cannot rule out that the affected information and/or personal data has become accessible (via the dark web) to unauthorized persons.

This could be information and/or personal data related to our staff, our customers, and/or our suppliers. We therefore advise everyone to be extra vigilant in the coming period for suspicious emails, messages, and/or phone calls.

We also want to alert you that certain information could possibly be used for activities like phishing and/or identity fraud. You can read how to recognize phishing and what to do in case of identity fraud on the web pages of ENISA, the European Union Agency for Cybersecurity.

Focus on Cybersecurity

Cybersecurity remains an important theme within Hanzestrohm. Together with external specialists, we are constantly working on a high level of security that meets all set requirements. We will, of course, continue to do so.

More Information

To not increase the risk of future cyberattacks, we will not provide further detailed information about the recent attack and the Hanzestrohm IT architecture and security measures taken.

Our Privacy Officer (privacy@hanzestrohm.nl) is available for questions.

We apologize for any inconvenience and thank you for your understanding.