{
	"id": "fb9ed563-9632-49eb-81f0-86d42d088a19",
	"created_at": "2026-04-06T00:09:25.384688Z",
	"updated_at": "2026-04-10T03:22:13.631069Z",
	"deleted_at": null,
	"sha1_hash": "a0e207bf8b6d9cd093c8198536e63280edef15cb",
	"title": "Biotech research firm Miltenyi Biotec hit by ransomware, data leaked",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 4392697,
	"plain_text": "Biotech research firm Miltenyi Biotec hit by ransomware, data leaked\r\nBy Sergiu Gatlan\r\nPublished: 2020-11-13 · Archived: 2026-04-05 17:35:00 UTC\r\nBiomedical and clinical research company Miltenyi Biotec says that it has fully restored systems after a malware attack that\r\ntook place last month and affected the firm's global IT infrastructure.\r\nMiltenyi Biotec's 2,500 employees from 28 countries are developing cell research and therapy products for clinicians and\r\nresearchers who are working on covid-19 vaccines and treatments.\r\nIt also provides SARS-CoV-2 antigens to researchers involved in SARS-CoV-2 vaccine development.\r\nhttps://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nBack up after restoring systems in roughly two weeks\r\n\"During the last two weeks, there have been isolated cases where order processing was impaired by malware in parts of our\r\nglobal IT infrastructure,\" Miltenyi Biotec said in an official statement.\r\n\"Rest assured, all necessary measures have now been taken to contain the issue and recover all affected systems. Based on\r\nour current knowledge, we have no indication that the malware has been inadvertently distributed to customers or partners.\"\r\nAt the moment, the company said that it has successfully restored all operational processes impacted in last month's malware\r\nattack. However, the company is still facing issues in some countries with their email and telephone systems.\r\nMiltenyi Biotec added that customers should expect order delays caused by the temporary operational issues affecting\r\nsystems during the last two weeks.\r\nClients are also advised to reach out whenever they have to deal with any urgent cases that required immediate assistance.\r\n\"Please accept our apologies for any inconvenience this may have caused you,\" Miltenyi Biotec added.  \r\nCustomers experiencing difficulties can reach out using a list of alternative contact numbers available here.  \r\nMount Locker ransomware attack\r\nEven though Miltenyi Biotec has not disclosed the nature of the malware that caused the operational downtime during the\r\nlast two weeks, the Mount Locker ransomware gang has claimed the attack earlier this month.\r\nThe ransomware actors have leaked 5% out of the 150 GB of data they claim to have stolen from the company's network on\r\ntheir data leak site on November 4, 2020, in the form of a ZIP archive containing just over 1 GB of Miltenyi Biotec\r\ndocuments.\r\nMount Locker ransomware became operational in July 2020 after they started to breach corporate networks, stealing\r\nsensitive data and deploying payloads to encrypt systems on the victims' network.\r\nMount Locker ransom notes seen by BleepingComputer show that, in some cases, the Mount Locker ransomware gang is\r\ndemanding multi-million dollar ransoms.\r\nhttps://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/\r\nPage 3 of 4\n\nMount Locker ransom note\r\nThe gang launched a 'Mount Locker News \u0026 Leaks' site used to publish the stolen files of victims who refuse to pay the\r\nransom.\r\nMount Locker is also known for threatening victims to contact the media, TV channels, and newspapers if the ransom is not\r\npaid.\r\nUnfortunately, Mount Locker ransomware uses ChaCha20 + RSA-2048 and, at the moment, there is no way to recover\r\nencrypted files for free.\r\nBleepingComputer reached out to a Miltenyi Biotec spokesperson for additional details but did not hear back at the time of\r\npublication.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/\r\nhttps://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked/"
	],
	"report_names": [
		"biotech-research-firm-miltenyi-biotec-hit-by-ransomware-data-leaked"
	],
	"threat_actors": [],
	"ts_created_at": 1775434165,
	"ts_updated_at": 1775791333,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a0e207bf8b6d9cd093c8198536e63280edef15cb.pdf",
		"text": "https://archive.orkl.eu/a0e207bf8b6d9cd093c8198536e63280edef15cb.txt",
		"img": "https://archive.orkl.eu/a0e207bf8b6d9cd093c8198536e63280edef15cb.jpg"
	}
}