
Utility expertise firm Itron, Inc. has disclosed that an unauthorized third social gathering accessed a few of its inner programs throughout a cyberattack.
The corporate states that it activated its cybersecurity response plan when detecting the exercise final month, notified regulation enforcement authorities, and engaged exterior advisors to help the investigation and incident containment.
“On April 13, 2026, Itron, Inc. was notified that an unauthorized third social gathering had gained entry to sure of its programs,” the firm says says in an 8-Okay submitting with the U.S. Securities and Alternate Fee (SEC).
“The corporate activated its cybersecurity response plan and launched an investigation with the help of exterior advisors to evaluate, mitigate, remediate, and include the unauthorized exercise.”
The unauthorized exercise has now been blocked, and the corporate acknowledged that it has noticed no follow-up exercise.
Itron is a Washington-based public firm that gives utility expertise services and products for vitality and water assets administration.
The corporate is listed on NASDAQ, employs roughly 5,600 individuals, and in 2025 reported income of $2.4 billion. It serves 7,700 prospects in 100 international locations and manages 112 million endpoints.
Itron’s enterprise is interwoven with crucial infrastructure reminiscent of electrical energy grids, water distribution, and gasoline networks.
Nevertheless, the corporate famous that on this case, enterprise operations recorded no materials disruption, and it doesn’t at the moment count on any subsequent affect. Additionally, it expects a good portion of incident-related prices to be coated by insurance coverage.
Itron has additionally famous that the unauthorized exercise didn’t prolong to prospects. Nevertheless, it’s essential to notice that the investigation into the incident’s scope and affect continues to be ongoing.
No ransomware group has claimed the assault on Itron. BleepingComputer contacted Itron with a request for extra particulars in regards to the assault and can replace this submit as soon as we hear again.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of latest exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.


