Industrial technology company Sensata Technologies disclosed that the company experienced a ransomware attack that encrypted parts of its network. The company took its systems offline, initiated response protocols, and launched an investigation with third-party cybersecurity experts. Law enforcement has been notified and is involved. This comes as several U.S. states have recently disclosed cyber incidents affecting critical government services, including Arizona, Arkansas, Idaho, Nebraska, and Oregon.
“On April 6, 2025, Sensata Technologies Holding plc (the “Company”) experienced a ransomware incident that has encrypted certain devices in the Company’s network,” Richard Siedel, vice president and chief accounting officer at the Massachusetts headquartered company, detailed in a Securities and Exchange Commission (SEC) filing on Wednesday. “Upon discovery, Sensata immediately activated its response protocols, implemented containment measures, including proactively taking its network offline, and launched an investigation with the assistance of third-party cybersecurity professionals. In coordination with legal counsel, the Company has notified law enforcement about the matter and is supporting its investigation.”
Siedel mentioned that the incident temporarily impacted Sensata’s operations, including shipping, receiving, manufacturing production, and various other support functions.
“While the Company has implemented interim measures to allow for the restoration of certain functions, the timeline for a full restoration is not yet known,” Siedel added. “The preliminary investigation has identified evidence that files were taken from the Company’s environment. The Company is working to identify and review the files involved and will take additional actions as appropriate based on its review, including notifying individuals and regulatory authorities in accordance with applicable law.”
The filing also added that “Sensata does not expect this incident to have a material impact on the Company’s financial results and operations for the three months ended June 30, 2025; however, the full scope and impact of this incident is not yet known and could result in a future determination that the incident will be material to the Company’s financial statements and results of operations.”
Oregon Department of Environmental Quality (DEQ) was forced to take its network offline on Wednesday in response to a cyberattack. The agency, responsible for overseeing the quality of the state’s air, land, and water, announced Wednesday evening that all vehicle inspection stations will remain closed through Friday as a result of the incident.
In a Thursday update, the DEQ said its “ is continuing to work with Enterprise Information Services and Microsoft’s cybersecurity team to analyze and resolve the cyber issue. At this time there is no evidence of a data breach.”
“DEQ’s systems will continue to be down,” the statement added. “This includes all email. The agency confirmed it has not been able to receive or send emails. If you need to reach someone at DEQ, contact them by phone. VIP stations will be closed today, tomorrow and Saturday, April 12.”
The agency added that ‘Your DEQ Online,’ DEQ’s environmental data information management system has not been impacted, and is hosted on a separate server and will continue to be operational.
Furthermore, staff are working around the clock to restore services and it may still be several days before business returns to normal.
In Arizona, the Federal Public Defender’s Office has been offline since last week following a ransomware attack, according to KUTV. As a result, several court cases have been postponed until May.
The Pulaski County’s clerk’s office in Arkansas confirmed it has recovered from a cyber incident that occurred in January. In Idaho, officials in Gooding County reported that a ransomware attack struck their network on March 25. County leaders have brought in federal law enforcement and cybersecurity firms to assist with the response. While the county continues to assess the extent of the breach, officials believe it’s likely that personal data was compromised.
As of Thursday, no ransomware gangs or hacker groups had claimed responsibility for the attacks in Arizona, Arkansas, or Idaho.
In Nebraska, the Qilin ransomware group claimed responsibility on Thursday for a cyberattack targeting the North Platte Natural Resources District. The organization confirmed it experienced a cyberattack and data breach on Nov. 27.
Just last month, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said that its goal is to protect the nation’s critical infrastructure from all cyber threats, including those from Russia.