{
	"id": "d5df413c-6af9-472f-bed4-20bf791d3c5a",
	"created_at": "2026-04-06T01:31:23.721594Z",
	"updated_at": "2026-04-10T03:24:16.820948Z",
	"deleted_at": null,
	"sha1_hash": "448af9c89ccd4b24ca5e71c4ff2bdec3a0103716",
	"title": "Engineering firm Parker discloses data breach after ransomware attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 2372997,
	"plain_text": "Engineering firm Parker discloses data breach after ransomware attack\r\nBy Bill Toulas\r\nPublished: 2022-05-16 · Archived: 2026-04-06 00:34:11 UTC\r\nThe Parker-Hannifin Corporation announced a data breach exposing employees' personal information after the Conti\r\nransomware gang began publishing allegedly stolen data last month.\r\nParker is an Ohio-based corporation specializing in advanced motion and control technologies, with a strong focus in\r\naerospace hydraulic equipment. It has a revenue of $15.6 billion and employs over 58,000 people.\r\nParker-Hannifin says a security incident occurred between March 11 and March 14, 2022, and that it involved a third party\r\nwho gained unauthorized access to Parker's computer systems.\r\nhttps://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nPage 1 of 5\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\n\"Upon learning of this incident, Parker's IT team immediately activated its incident response protocols, which included\r\nshutting down certain systems,\" reads the firm's notice.\r\n\"Parker then launched an investigation with the assistance of a forensic investigation firm and other third-party cyber\r\nsecurity and incident response professionals.\"\r\nThe subsequent investigation determined that threat actors had exfiltrated specific files from the firm's computers, so Parker\r\nimmediately informed the law enforcement authorities of the data breach.\r\nEmployee data exposed\r\nUpon reviewing the stolen files, Parker determined that stolen data included information related to current and former\r\nemployees enrolled in Parker's Group Health Plans and their dependents.\r\nThe information that was compromised includes the following details:\r\nFull name\r\nSocial Security Number (SSN)\r\nDate of birth\r\nHome address\r\nDriver's license number\r\nU.S. passport number\r\nFinancial account information (bank account and routing numbers)\r\nOnline account username and password\r\nHealth insurance plan member ID number\r\nHealth insurance dates of coverage\r\nThe exposed information includes dates of service, health provider info, claims data, and clinical treatment details for a\r\nsmall subset of employees.\r\nThe above details would make it possible for malicious actors to carry out phishing attacks, social engineering, or even\r\nidentity theft and bank fraud.\r\nFor this reason, Parker is also covering all impacted employees and beneficiaries with a two-year membership in identity\r\nprotection services via Experian.\r\nConsidering that the incident impacts current and former employees, their dependents, and employees and beneficiaries of\r\nsubsidiaries, the number of the affected individuals could be far more significant than the company's current workforce.\r\nConti claimed the attack\r\nWhile Parker-Hannifin did not disclose who attacked them in April, the Conti ransomware group claimed responsibility on\r\nApril 1, 2022, when the notorious gang published 3% of the data that they allegedly stole during their attack. \r\nFull publication of the entire 419GB data set followed on April 20, which likely means that negotiations for the payment of a\r\nransom had failed or never occurred.\r\nhttps://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nPage 3 of 5\n\nParker listing on Conti's extortion site (Bleeping Computer)\r\nParker-Hannifin designs and manufactures aerospace components, including hydraulic assemblies and fuel systems for\r\nAirbus, Boeing, Sikorsky, Rolls-Royce, Lockheed Martin, and the Commercial Aircraft Corporation of China.\r\nAs such, a data breach on the firm's systems might have compromised technical details and schematics that are worth a lot in\r\nengineering circles and could help competitors leap forward using stolen R\u0026D.\r\nAt this time, we don't know if Conti accessed technical data or if the breach was limited to employee details, but similar data\r\nhas been stolen in previous attacks.\r\nBleeping Computer has emailed Parker-Hannifin to determine the number of impacted individuals and clarify if technical\r\ndata was also stolen in the incident, but a spokesperson of the firm declined to comment.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nhttps://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nPage 4 of 5\n\nSource: https://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nhttps://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/engineering-firm-parker-discloses-data-breach-after-ransomware-attack/"
	],
	"report_names": [
		"engineering-firm-parker-discloses-data-breach-after-ransomware-attack"
	],
	"threat_actors": [
		{
			"id": "dfee8b2e-d6b9-4143-a0d9-ca39396dd3bf",
			"created_at": "2022-10-25T16:07:24.467088Z",
			"updated_at": "2026-04-10T02:00:05.000485Z",
			"deleted_at": null,
			"main_name": "Circles",
			"aliases": [],
			"source_name": "ETDA:Circles",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775439083,
	"ts_updated_at": 1775791456,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/448af9c89ccd4b24ca5e71c4ff2bdec3a0103716.pdf",
		"text": "https://archive.orkl.eu/448af9c89ccd4b24ca5e71c4ff2bdec3a0103716.txt",
		"img": "https://archive.orkl.eu/448af9c89ccd4b24ca5e71c4ff2bdec3a0103716.jpg"
	}
}