{
	"id": "649c1b7a-88e9-4da5-8e87-18c291f5888b",
	"created_at": "2026-04-06T00:12:22.102891Z",
	"updated_at": "2026-04-10T03:20:47.482583Z",
	"deleted_at": null,
	"sha1_hash": "10c952e58161835c5f36d666bceb485a0368dc55",
	"title": "Siemens Energy confirms data breach after MOVEit data-theft attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 611045,
	"plain_text": "Siemens Energy confirms data breach after MOVEit data-theft attack\r\nBy Bill Toulas\r\nPublished: 2023-06-27 · Archived: 2026-04-02 11:34:23 UTC\r\nSiemens Energy has confirmed that data was stolen during the recent Clop ransomware data-theft attacks using a zero-day\r\nvulnerability in the MOVEit Transfer platform.\r\nSiemens Energy is a Munich-based energy technology company with a global presence, employing 91,000 people and\r\nhaving an annual revenue of $35 billion.\r\nIt designs, develops, and manufactures a wide range of industrial products, including industrial control systems (ICS), state-of-the-art power, heat generation units, renewable energy systems, on and off-site energy delivery systems, and flexible\r\npower transmission solutions.\r\nhttps://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/\r\nPage 1 of 4\n\nhttps://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nThe company also provides a wide range of cybersecurity consulting services for the oil and gas industry, including incident\r\nresponse plans, vulnerability assessment, and patch management.\r\nSiemens Energy confirms breach\r\nToday, Clop listed Siemens Energy on their data leak site, indicating that data was stolen during a breach on the company.\r\nAs part of Clop's extortion strategy, they first begin listing a company's name on their data leak site to apply pressure,\r\nfollowed by the eventual leaking of data.\r\nWhile no data has been leaked at this time, a Siemens Energy spokesperson confirmed that they were breached in the recent\r\nClop data-theft attacks utilizing a MOVEit Transfer zero-day vulnerability tracked as CVE-2023-34362.\r\nHowever, Siemens Energy says that no critical data was stolen, and business operations were not impacted.\r\n\"Regarding the global data security incident, Siemens Energy is among the targets,\" confirmed Siemens Energy to\r\nBleepingComputer.\r\n\"Based on the current analysis no critical data has been compromised and our operations have not been affected. We took\r\nimmediate action when we learned about the incident.\"\r\nSchneider Electric investigating\r\nAlong with Siemens Energy, Clop claim to have stolen data from MOVEit Transfer systems of another industry giant,\r\nSchneider Electric.\r\nClop leaks Siemens Energy and Schneider Electric\r\n(BleepingComputer)\r\nThe French multinational company, with an annual revenue of over $37 billion, specializes in digital automation and energy\r\nmanagement, and its products are used in a broad range of vital industries worldwide.\r\n\"On May 30th, 2023, Schneider Electric became aware of vulnerabilities impacting Progress MOVEit Transfer software. We\r\npromptly deployed available mitigations to secure data and infrastructure and have continued to monitor the situation\r\nclosely,\" mentions the firm's statement to BleepingComputer.\r\n\"Subsequently, on June 26th, 2023, Schneider Electric was made aware of a claim mentioning that we have been the victim\r\nof a cyber-attack relative to MOVEit vulnerabilities.\"\r\n\"Our cybersecurity team is currently investigating this claim as well.\"\r\nWhile the company has not verified Clop's claims, the validity of their previously disclosed breaches raises the likelihood of\r\nthe claims being true.\r\nMOVEit fallout continues\r\nhttps://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/\r\nPage 3 of 4\n\nThe impact of Clop's MOVEit attacks is still unfolding, as new victims are being disclosed on the gang's website, and data\r\npublished daily.\r\nThe attacks have impacted companies, federal government agencies, and local state agencies, leading to widespread data\r\nbreaches that have exposed the sensitive data of millions of people.\r\nYesterday, The New York City Department of Education (NYC DOE) admitted that Clop stole documents containing the\r\nsensitive personal information of up to 45,000 students.\r\nOn June 16th, millions of Oregon and Louisiana citizens learned that their driver's licenses had been stolen in attacks carried\r\nout by the ransomware gang.\r\nOther victims that already disclosed data breaches related to the MOVEit Transfer attacks include the U.S. state of Missouri,\r\nthe U.S. state of Illinois, Zellis (along with its customers BBC, Boots, Aer Lingus, and Ireland's HSE), Ofcam,\r\nthe government of Nova Scotia, the American Board of Internal Medicine, and Extreme Networks.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/\r\nhttps://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/siemens-energy-confirms-data-breach-after-moveit-data-theft-attack/"
	],
	"report_names": [
		"siemens-energy-confirms-data-breach-after-moveit-data-theft-attack"
	],
	"threat_actors": [],
	"ts_created_at": 1775434342,
	"ts_updated_at": 1775791247,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/10c952e58161835c5f36d666bceb485a0368dc55.pdf",
		"text": "https://archive.orkl.eu/10c952e58161835c5f36d666bceb485a0368dc55.txt",
		"img": "https://archive.orkl.eu/10c952e58161835c5f36d666bceb485a0368dc55.jpg"
	}
}