
Utility know-how firm Itron, Inc. has disclosed that an unauthorized third social gathering accessed a few of its inside methods throughout a cyberattack.
The corporate states that it activated its cybersecurity response plan when detecting the exercise final month, notified legislation enforcement authorities, and engaged exterior advisors to help the investigation and incident containment.
“On April 13, 2026, Itron, Inc. was notified that an unauthorized third social gathering had gained entry to sure of its methods,” the firm says says in an 8-Ok submitting with the U.S. Securities and Change Fee (SEC).
“The corporate activated its cybersecurity response plan and launched an investigation with the help of exterior advisors to evaluate, mitigate, remediate, and include the unauthorized exercise.”
The unauthorized exercise has now been blocked, and the corporate said that it has noticed no follow-up exercise.
Itron is a Washington-based public firm that gives utility know-how services and products for vitality and water sources administration.
The corporate is listed on NASDAQ, employs roughly 5,600 folks, and in 2025 reported income of $2.4 billion. It serves 7,700 clients in 100 international locations and manages 112 million endpoints.
Itron’s enterprise is interwoven with vital infrastructure corresponding to electrical energy grids, water distribution, and gasoline networks.
Nevertheless, the corporate famous that on this case, enterprise operations recorded no materials disruption, and it doesn’t presently anticipate any subsequent impression. Additionally, it expects a good portion of incident-related prices to be coated by insurance coverage.
Itron has additionally famous that the unauthorized exercise didn’t prolong to clients. Nevertheless, it’s vital to notice that the investigation into the incident’s scope and impression remains to be ongoing.
No ransomware group has claimed the assault on Itron. BleepingComputer contacted Itron with a request for extra particulars in regards to the assault and can replace this put up as soon as we hear again.
AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of recent exploits is coming.
On the Autonomous Validation Summit (Might 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.


