JBS has told U.S. government officials it believes the cybersecurity attack that has affected the meat processing giant’s computer servers in North America and Australia was likely based in Russia.

“JBS notified the administration that the ransom demand came from a criminal organization likely based in Russia,” said White House Deputy Press Secretary Karine Jean-Pierre on Tuesday. “The White House is engaging directly with the Russian government on this matter and delivering the message that responsible states do not harbor ransomware criminals.”

“We’re assessing any impacts on supply, and the President has directed the administration to determine what we can do to mitigate any impacts as they may become necessary,” she continued.

JBS says it took immediate action after noticing the attack on Sunday — suspending all affected systems, notifying authorities, and activating the company’s global network of IT professionals and third-party experts to resolve the situation. It also halted operations at five of its biggest beef plants in the U.S.

JBS has not confirmed details on how slaughter operations have been impacted at its beef plant Brooks, Alberta, but it appears both the “A” and “B” shifts of harvest and fabrication were cancelled on Monday, and the A shift was cancelled again on Tuesday, according to the JBS Canada Instagram account.

The United States Department of Agriculture (USDA)’s daily cattle slaughter estimates showed 94,000 head of cattle were processed on June 1, a drop of 27,000 head from the same time last week.

JBS says it is not aware of any evidence at this time that any customer, supplier or employee data has been compromised or misused as a result of the situation.

Leave a Reply

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

gdpr, __cfduid, PHPSESSID, wordpress_test_cookie, woocommerce_items_in_cart, woocommerce_cart_hash, wp_woocommerce_session, wordpress_logged_in, wordpress_sec, wp-settings, wp-settings-time, __cf_mob_redir, wordpress_cache, realag
__cfduid

Marketing

Measuring interactions with the ads on the domain.

__gads,fsk_ut_2317
IDE

Statistics

These are used to track user interaction and detect potential problems. These help us improve our services by providing analytical data on how users use this site.

_ga,_gid,_gat,_cb,_chartbeat2,_chartbeat4
_ga,_gid
metrics_token

Preferences

Preference cookies enable the website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

chartdefaults, comment_author, comment_author_email, comment_author_url
JSESSIONID, _os_session,anonymous_votes,csrf-param,csrf-token,user,user-id,user-platform,intercom-session,intercom-lou,intercom-session
personalization_id, tfw_exp