Table of Contents
Johnson Controls International has suffered what is described as a huge ransomware attack that encrypted lots of of the corporation devices, including VMware ESXi servers, impacting the company’s and its subsidiaries’ functions.
Johnson Controls is a multinational conglomerate that develops and manufactures industrial manage techniques, safety tools, air conditioners, and hearth safety equipment.
The company employs 100,000 people today by means of its corporate operations and subsidiaries, like York, Tyco, Luxaire, Coleman, Ruskin, Grinnel, and Simplex.
A weekend cyberattack
Yesterday, a source explained to BleepingComputer that Johnson Controls endured a ransomware attack soon after initially staying breached at its Asia offices.
BleepingComputer has since learned that the corporation endured a cyberattack around the weekend that brought about the firm to shut down portions of its IT programs.
Due to the fact then, many of its subsidiaries, such as York, Simplex, and Ruskin, have started to display specialized outage messages on website login internet pages and shopper portals.
“We are presently dealing with IT outages that might limit some buyer programs these kinds of as the Simplex Buyer Portal,” reads a message on the Simplex web site.
“We are actively mitigating any potential impacts to our products and services and will continue to be in conversation with clients as these outages are resolved.”

Supply: BleepingComputer
If you have any facts on this attack or other attacks, you can get hold of us confidentially via Signal at 646-961-3731
Clients of York, one more Johnson Controls subsidiary, report that they are getting explained to the company’s units are down, with some stating they have been told it was owing to a cyberattack.
“Their computer system process crashed about the weekend. Manufacturing and all the things is down,” a York customer posted to Reddit.
“I talked to our rep and he explained somebody hacked them,” posted another buyer.
This morning, Nextron Units risk researcher Gameel Ali tweeted a sample of a Dark Angels VMware ESXi encryptor that contains a ransom take note stating it was utilized from Johnson Controls.

Source: BleepingComputer
BleepingComputer has been instructed that the ransom note back links to a negotiation chat wherever the ransomware gang needs $51 million to give a decryptor and to delete stolen data.
The menace actors also claim to have stolen above 27 TB of corporate knowledge and encrypted the company’s VMWare ESXi virtual machines through the assault.
BleepingComputer has contacted Johnson Controls with thoughts regarding the assault but has not received a response.
Following publication of our tale, Johnson Controls verified the cybersecurity incident in a Form 8-K submitting with the SEC, stating that they are functioning with external cybersecurity experts to examine the incident and coordinating with insurers.
“Johnson Controls International plc (the “Company”) has experienced disruptions in portions of its interior info technologies infrastructure and programs ensuing from a cybersecurity incident. Promptly following detecting the difficulty, the Firm began an investigation with guidance from leading external cybersecurity professionals and is also coordinating with its insurers. The Business carries on to evaluate what facts was impacted and is executing its incident administration and defense program, which include utilizing remediation actions to mitigate the influence of the incident, and will continue on getting added measures as proper. To date, many of the Company’s apps are mostly unaffected and continue being operational. To the extent doable, and in line with its enterprise continuity ideas, the Organization carried out workarounds for sure functions to mitigate disruptions and proceed servicing its buyers. On the other hand, the incident has induced, and is anticipated to proceed to cause, disruption to pieces of the Company’s company operations. The Business is evaluating no matter if the incident will effect its ability to well timed release its fourth quarter and entire fiscal calendar year success, as properly as the affect to its economical final results.
The Company’s investigation and remediation attempts are ongoing.”
Who is the Darkish Angels ransomware gang?
Darkish Angels is a ransomware operation launched in Might 2022 when it started concentrating on organizations around the world.
Like pretty much all human-operated ransomware gangs, Darkish Angels breaches company networks and then spreads laterally by the community. During this time, the risk actors steal details from file servers to be utilised in double-extortion assaults.
When they acquire accessibility to the Windows domain controller, the danger actors deploy the ransomware to encrypt all gadgets on the community.
The menace actors initially made use of Windows and VMware ESXi encryptors dependent on the source code leak for the Babuk ransomware.
Nevertheless, cybersecurity researcher MalwareHunterTeam tells BleepingComputer that the Linux encryptor made use of in the Johnson Controls attack is the similar as ones used by Ragnar Locker considering that 2021.
Dim Angels released a info leak website in April 2023 referred to as ‘Dunghill Leaks’ that is used to extort its victims, threatening to leak information if a ransom is not paid out.

Resource: BleepingComputer
This extortion web page now lists nine victims, which include Sabre and Sysco, who lately disclosed cyberattacks.
Update 9/27/23: Added statement from Type 8-K filing.