Fraud Management & Cybercrime , Ransomware , Standards, Regulations & Compliance

MKS Instruments Ransomware Attack Results in $200M Sales Hit

Attack Removed MKS' Ability to Process Orders, Ship Products or Provide Services
MKS Instruments Ransomware Attack Results in $200M Sales Hit
Image: Getty Images

Semiconductor equipment maker MKS Instruments says a February ransomware attack will cost it $200 million in lost revenue after the hack removed its ability to process orders or ship products.

See Also: 2023 Ransomware Preparedness: Key Findings, Readiness and Mitigation

The Andover, Massachusetts company told federal regulators the Feb. 3 ransomware attack required the company to temporarily suspend operations at some facilities. More than a month later, it still hasn't reopened all affected manufacturing and service operations in its $1.96 billion Vacuum Solutions Divisions and its $1.06 billion Photonics Solutions Division (see: Ransomware Attack Disrupts Operations at MKS Instruments).

On March 3, a former employee hit the company with a putative class action lawsuit filed in Orange County Superior Court accusing it of violating California privacy law by failing to safeguard medical and personal information. MKS Instruments said it will defend itself in the lawsuit but can't predict the timing, outcome or cost of the proceedings.

"The financial ramifications, temporary manufacturing delays and the class action lawsuit underscore the potential cascading impacts of any cyber incident and the need to bolster cybersecurity across the industry," Terry Dennehy, vice president and senior credit officer for Moody's Investors Service, said in a statement.

Data Exfiltration Might Have Accompanied System Encryption

MKS Instruments generated $742 million of revenue in the quarter ended March 31, 2022. A $200 million impact from the ransomware attack represents a nearly 27% hit to sales. The company said it has completed restoration of many of its IT systems, including its ERP, since the hack. The company's $517 million Materials Solution Division - which was bought from Atotech - wasn't affected by the incident.

In addition to lost revenue, MKS Instruments incurred ransomware-related costs tied to bringing on forensic experts, restoration experts and legal counsel and from paying increased overtime to employees. The company said it has also spent money this quarter to restore its systems, access its data and enhance its cybersecurity measures.

In addition to encrypting business and manufacturing systems, MKS Instruments said the hackers might have exfiltrated workers' Social Security numbers, bank account information, payment card information, and information about disabilities, health and medical conditions.

The plaintiff in the class action complaint, who is identified only as John Doe, alleges MKS Instruments failed to invest in cybersecurity. The filing says MKS Instruments didn't encrypt medical and personal information or implement adequate user authorization and authentication processes.

MKS Instruments said it determined after the ransomware attack that it hadn't maintained sufficient IT controls to prevent or detect unauthorized access to its financial reporting systems on a timely basis. Specifically, the company said controls around access authentication, intrusion detection and response, and backup and restoration came up short, making it difficult for MKS to recover quickly.

Although the weakness around MKS Instruments' financial reporting systems didn't result in a misstatement in any of the company's financial statements, the company said insufficient controls meant a material misstatement wouldn't have been prevented or detected, had one occurred.

MKS Instruments said it plans to strengthen access requirements and unauthorized access detection for its financial reporting systems as well as implement procedures to facilitate more timely restoration. The weaknesses won't be considered remediated until the plan has been fully implemented, applicable controls have been operating for a sufficient period of time, and it has been determined that the controls operate effectively.

The company told regulators it has exposed itself to more or different cyber and data security threats as it transitions to using more cloud-based solutions that are dependent on the internet or other networks to operate. MKS Instruments said the risks may be amplified by increased reliance on remote access to IT systems as a result of using SaaS software and cloud and remote services and having staffers work remotely.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.