IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Trouble is brewing at Molson Coors after massive hack

The hack has impacted the brewer’s beer-making capabilities

Sign showing all the Coors brands

Chicago-based brewing firm Molson Coors has revealed a cyber attack has disrupted its beer-making operations.

In a Form-8K filed with the SEC today, the brewer said it’s engaging with “forensic information technology firms and legal counsel to assist the Company’s investigation into the incident and the Company is working around the clock to get its systems back up as quickly as possible.”

“Although the Company is actively managing this cybersecurity incident, it has caused and may continue to cause a delay or disruption to parts of the Company’s business, including its brewery operations, production, and shipments.”

The company has not provided additional details of the attack in the advisory or elsewhere.

Sam Curry, chief security officer (CSO) at Cybereason, told ITPro that, unfortunately, alcohol- and spirits-distribution companies are coming under attack. 

“During the Covid-19 pandemic, alcohol has been a creature comfort, and it's been a good time for business in one corner of the economy - but this puts a target squarely on their backs,” Curry said.

"For Molson, I recommend being transparent above all. Be clear and unified in messaging. Get help from people who specialize in crisis communications immediately and put the customers and partners right in the center of your efforts. The public will see you as a hero or a villain in the end, not a victim. There is no victim option. So, decide what it's going to be, and manage this appropriately. My advice, by the way, is to choose hero. It's a better look, and your shareholders, customers, and partners will stick with you for the strength and integrity,” Curry added.

Lewis Jones, threat intelligence analyst at Talion, told ITPro that his advice to the company would be to take the following steps: Fully investigate the breach to confirm what information was compromised; change and strengthen login credentials and passwords; ensure any third-party clients are aware of any impact and provide advice around ensuring they stay safe; and stay alert and monitor your accounts.

“To attempt to mitigate the likelihood of an attack in future the business should - keep software up to date, encrypt information, use strong login credentials/Multi-Factor Authentication & stay up to date with the ever-changing and diverse threat landscape,” Jones said. 

“There has been a significant increase in ransomware attacks over the past 12 months, with this technique becoming increasingly popular and lucrative for threat attackers. The company should be mindful that whilst paying the ransom this provides no guarantee that the data will be deleted and won’t be published in the future." 

Featured Resources

Activation playbook: Deliver data that powers impactful, game-changing campaigns

Bringing together data and technology to drive better business outcomes

Free Download

In unpredictable times, a data strategy is key

Data processes are crucial to guide decisions and drive business growth

Free Download

Achieving resiliency with Everything-as-a-Service (XAAS)

Transforming the enterprise IT landscape

Free Download

What is contextual analytics?

Creating more customer value in HR software applications

Free Download

Recommended

Protecting healthcare from cybercrime
Whitepaper

Protecting healthcare from cybercrime

25 May 2022
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

18 May 2022
The Total Economic Impact™ of Apple Mac in Enterprise: M1 update
Whitepaper

The Total Economic Impact™ of Apple Mac in Enterprise: M1 update

12 May 2022
Dell Technologies World 2022: Dell unveils fastest storage architecture in company history
Server & storage

Dell Technologies World 2022: Dell unveils fastest storage architecture in company history

4 May 2022

Most Popular

Open source packages with millions of installs hacked to harvest AWS credentials
hacking

Open source packages with millions of installs hacked to harvest AWS credentials

24 May 2022
Europe's first autonomous petrol station opens in Lisbon
automation

Europe's first autonomous petrol station opens in Lisbon

23 May 2022
Nvidia pauses hiring to help cope with inflation
Careers & training

Nvidia pauses hiring to help cope with inflation

23 May 2022