Ascom, a prominent software provider specializing in the healthcare sector, was the victim of a cyber attack on March 16, 2025. The attack primarily targeted the company’s technical ticketing system, which was immediately shut down after the breach was discovered. The company reassured its stakeholders that no other IT systems or customer systems were impacted by the attack, and its business operations continued without disruption. Ascom’s cybersecurity team quickly initiated an investigation to assess the scale and nature of the breach, ensuring that no further damage would be done.
The Hellcat ransomware gang took responsibility for the attack, publicly claiming they had breached Ascom’s IT infrastructure on social media platform X (formerly Twitter). In response to the attack, Ascom’s IT cybersecurity team worked swiftly to isolate the compromised ticketing system and launch an internal investigation into the cause and scope of the incident. Despite the attack, the company emphasized that its other IT systems and customer-facing systems remained fully operational, and there were no reports of service disruptions or data breaches beyond the ticketing system.
Ascom assured its customers, partners, and stakeholders that no preventive actions are needed on their part at this time.
The company has made it clear that the situation is being closely monitored, and it is keeping in direct contact with its partners through regional leadership channels.
Ascom is dedicated to providing timely updates as the investigation continues, ensuring transparency and clarity regarding the status of the incident and any potential implications for its clients.
To facilitate communication, Ascom has invited media inquiries and concerns from any interested third parties to be directed to its official email address. The company is fully cooperating with the relevant authorities and law enforcement agencies to ensure a thorough investigation.
Ascom has committed to keeping everyone updated on any new developments related to the breach and will continue working with experts and authorities to address the cyber attack effectively.
Reference: