Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

Molson Coors cyberattack impacts production, shipments

  • Gary Cohen
  • April 1, 2021
Courtesy: Rick Ellis
Courtesy: Rick Ellis
Total
1
Shares
0
1
0
0

Another major company has fallen victim to a cyberattack that has caused significant disruptions to its business operations. In an SEC filing, Chicago-based brewing and beverage company Molson Coors recently acknowledged they experienced a systems outage due to “a cybersecurity incident.”

While the multinational brewer has been tight-lipped about the specifics of the attack so far, they did note it caused widespread issues to disparate parts of the business, including brewery operations, production and shipments. In the filing, Molson-Coors said it is actively managing the situation and “working around the clock” to get its systems back up and running as quickly as possible.

Given recent high-profile attacks on other major companies – such as Kia Motors and packaging giant WestRock – many security experts have speculated that this could be a ransomware attack. Adult beverage companies have been squarely in the crosshairs in the last year, with Jack Daniel’s owner Brown-Forman, Australia’s Lion and Italy’s Licya Campari Group all suffering attacks, according to Forbes.

Either way, the downtime caused by taking systems offline could be a significant cost for Molson Coors. That’s often the point with these kinds of cyberattacks. To remediate significant hacks like this, companies must spend resources to do discovery and mitigate any damage. For food and beverage manufacturers, which often run their plants 24/7, taking systems offline for any length of time can be a sizable drain.

“One of the big concerns that I have for the industry in general is the economic drag it takes just to play the game, just to be diligent and respond to these attacks,” said Tyler Whitaker, chief technology officer and chief operating officer of Leading2Lean, a CFE Media content partner. “That’s a big economic impact to these attacks that I think probably files under the radar a little bit.”

Molson Coors is responsible for many beer brands including Coors Light, Miller Lite and Blue Moon. While the company stated it is back to near-normal operations, both production and shipments could be delayed in the coming months.

RELATED ARTICLES

Cyberattacks on SolarWinds and Oldsmar: CEO Interview Series, John Livingston, Verve Industrial
https://www.industrialcybersecuritypulse.com/ceo-interview-series-john-livingston-ceo-verve-industrial-protection/

Verkada cybersecurity breach exposes data from 150,000 surveillance cameras
https://www.industrialcybersecuritypulse.com/verkada-cybersecurity-breach-exposes-data-from-150000-surveillance-cameras/

Oldsmar water treatment facility attack is an example of rising cyber threat
https://www.industrialcybersecuritypulse.com/water-treatment-facility-targeted-by-hackers/

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Gary Cohen

Gary Cohen is senior editor/product manager at CFE Media.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
Figure 1: Technological advances are keeping the world connected. High-performance HMI graphics, for instance, are key to getting critical data to the right people at the right time and can help improve an operator’s ability to manage the operation more effectively, increasing response time to alarms and other abnormal situations. Data really is king. Courtesy: MAVERICK Technologies
  • Networks

How to achieve remote automation success

  • Ram Ramamoorthy
  • March 31, 2021
Read More
Next Article
Selecting HMI remote access options
  • Networks

Selecting HMI remote access options

  • Jonathan Griffith
  • April 1, 2021
Read More
You May Also Like
Courtesy: A3/Siemens
Read More

Industrial robot utilization requires cybersecurity strategy

Courtesy: Brett Sayles
Read More

Throwback attack: Russia launches its first cyberattack on the U.S. with Moonlight Maze

Read More

Throwback attack: Russia breaches Wolf Creek Nuclear Power facility

Courtesy: CFE Media and Technology
Read More

Lack of qualified cybersecurity personnel for critical infrastructure

Figure 1: PLCs, HMIs, and other Ethernet-capable automation devices used for modern automation systems can no longer rely on “cybersecurity by obscurity” and “air gaps.” They must progressively adopt advanced IT type security features. Courtesy: AutomationDirect
Read More

Cybersecurity-centered systems and fundamentals

Read More

Port and maritime cybersecurity vulnerabilities are getting more focus

Figure 1: For smaller organizations with limited network resources, it can be tempting to plug your machine directly into the business network. Courtesy: DMC
Read More

Securing your facility

Courtesy: Trekkor
Read More

Bridging the IT and OT gap for a power service company

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Berkeley Internet Name Domain (BIND) - May 19, 2022
  • Mitsubishi Electric - May 19, 2022
  • Apache - May 16, 2022
  • CISA - May 16, 2022
  • Joint Cybersecurity Advisory - May 17, 2022

RECENT NEWS

  • Throwback Attack: Hackers attempt to flood Israeli water supply with chlorine
  • Will CISA recommend securing industrial control systems?
  • How to implement layered industrial cybersecurity in volatile times
  • Throwback Attack: DDoS attacks are born in the Big Ten
  • Improve two-factor authentication system security

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT