Post

EV Charger Company ELECQ Hit by Ransomware Attack, Customer Data Compromised

EV Charger Company ELECQ Hit by Ransomware Attack, Customer Data Compromised

🚨 Ransomware Attack on ELECQ

ELECQ, the manufacturer of smart electric vehicle (EV) chargers, has issued a warning to its customers regarding a recent ransomware attack that may have compromised their personal information. The attack, which targeted the company’s AWS cloud platform, was detected on March 7, 2026, when unusual activity was observed.

In a notice sent to customers, ELECQ revealed that the attackers not only encrypted but also copied user data from its systems. The compromised information includes names, email addresses, phone numbers, and home addresses. Fortunately, the company has confirmed that no financial data, such as payment records or credit card information, was involved in the breach. The charging devices themselves remain secure and operational. ⚡️

Incident Response

Upon discovering the breach, ELECQ promptly initiated its incident response process. Affected servers were taken offline, and the company began restoring systems from backups. Additionally, they have enhanced their security measures by shutting down remote access services and improving encryption across their network.

ELECQ has reported the incident to relevant regulators, including the UK’s Information Commissioner’s Office and Germany’s Federal Commissioner for Data Protection and Freedom of Information, indicating that the breach may affect customers in multiple European markets. They have also engaged third-party cybersecurity specialists to conduct a forensic investigation and identify any remaining vulnerabilities.

Customer Advisory

Customers are advised to remain vigilant for phishing messages, reset their account passwords, and monitor their inboxes for any suspicious activity. While the compromised data may seem innocuous, it can be exploited for social engineering scams.

For more details, you can read the complete article here.

This post is licensed under CC BY 4.0 by the author.