{
	"id": "0bfc7ce5-3e92-487d-97e7-2c9cac316838",
	"created_at": "2026-04-06T00:22:24.419205Z",
	"updated_at": "2026-04-10T03:20:36.206324Z",
	"deleted_at": null,
	"sha1_hash": "a519ae689e7b472085034fe5a0f0eb501de8151d",
	"title": "Conti ransomware hits Apple, Tesla supplier",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 81764,
	"plain_text": "Conti ransomware hits Apple, Tesla supplier\r\nBy Catalin Cimpanu\r\nPublished: 2023-01-17 · Archived: 2026-04-05 15:25:33 UTC\r\nThe Conti ransomware gang has been linked to an attack on Delta Electronics, a Taiwanese electronics\r\nmanufacturing company and a major supplier of power components to companies like Apple and Tesla.\r\nThe attack took place last Friday, on January 21, according to a statement shared by the company with stock\r\nmarket authorities.\r\nThe company said the attack was detected right away, and its security team intervened to contain infected systems\r\nand begin recovery operations.\r\nDelta, which is primarily known for its powerful UPS solutions, said the attack did not impact its production\r\nsystems.\r\nHowever, in a report today from local tech news site CTWANT, a reporter claims to have obtained a copy of an\r\ninternal incident report detailing the attack in far-grimmer conditions.\r\nMore than 1,500 servers and more 12,000 of Delta's 65,000 computer fleet were encrypted by the attackers.\r\nDelta, who is supposedly working with Trend Micro and Microsoft to contain the damage, is said to have found a\r\ncopy of the ransomware deployed inside its network, which was identified as a version of Conti.\r\nThe attackers allegedly requested a ransom demand of $15 million from the Taiwanese electronics maker.\r\nAt the time of writing, Delta's name has yet to be mentioned on Conti's leak site, which typically means that the\r\ntwo entities are still negotiating a payment.\r\nAccording to a source familiar with the attack who tipped The Record about the incident, the company has yet to\r\nrestore most of its systems, and its official websites remain offline. The company is using an alternative web\r\nserver to keep in contact with its customers.\r\nA Delta spokesperson has not yet returned a request for comment sent earlier this week.\r\nFile hash of the Conti sample that was allegedly deployed inside Delta's network:\r\n5ace33358a8b11ae52050d02d2d6705f04bd47a27c6c6e28ef65028bbfaf5da9\r\nhttps://therecord.media/conti-ransomware-hits-apple-tesla-supplier/\r\nPage 1 of 2\n\nCatalin Cimpanu\r\nis a cybersecurity reporter who previously worked at ZDNet and Bleeping Computer, where he became a well-known name in the industry for his constant scoops on new vulnerabilities, cyberattacks, and law enforcement\r\nactions against hackers.\r\nSource: https://therecord.media/conti-ransomware-hits-apple-tesla-supplier/\r\nhttps://therecord.media/conti-ransomware-hits-apple-tesla-supplier/\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://therecord.media/conti-ransomware-hits-apple-tesla-supplier/"
	],
	"report_names": [
		"conti-ransomware-hits-apple-tesla-supplier"
	],
	"threat_actors": [],
	"ts_created_at": 1775434944,
	"ts_updated_at": 1775791236,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a519ae689e7b472085034fe5a0f0eb501de8151d.pdf",
		"text": "https://archive.orkl.eu/a519ae689e7b472085034fe5a0f0eb501de8151d.txt",
		"img": "https://archive.orkl.eu/a519ae689e7b472085034fe5a0f0eb501de8151d.jpg"
	}
}