• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Ransomware Takes Down Network Of French It Giant

Ransomware Takes Down Network of French IT Giant

You are here: Home / Latest Cyber Security Vulnerabilities / Ransomware Takes Down Network of French IT Giant
October 23, 2020

Sopra Steria strike with cyber attack that reportedly encrypted components of their network on Oct. 20 but has remained largely mum on particulars.

French IT large Sopra Steria was strike with a cyber attack this 7 days that disrupted the enterprise of the firm and is greatly considered to be the work of the menace actors at the rear of Ryuk ransomware.

The organization revealed the attack in a brief push assertion produced Oct. 22, two times following officers claimed the attack—which reportedly encrypted parts of the firm’s network—occurred.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper take secure and enxrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“A cyberattack has been detected on Sopra Steria’s IT network on the night of 20th October,” officers reported. “Security measures have been applied in purchase to consist of pitfalls.”
Sopra Steria employs 46,000 people in 25 international locations and even has a cybersecurity arm that specializes in serving to prospects apply “reliable security and resiliency,” according to its web site.

On the other hand the company, which did $4.4 billion in organization last 12 months, divulged almost nothing of just what type of attack it was and what solutions, techniques and info ended up affected, sources in the French media declare it was Ryuk ransomware that took down the enterprise.

If that’s legitimate than the attackers powering Ryuk have been very energetic lately. Previously this week the group—also dependable for the TrickBot and BazarLoader bacterial infections applied together with the ransomware—also struck in an unusually swift attack that went from sending a phishing email to total encryption throughout the victim’s network in just five hrs.

Ryuk also is behind a ransomware attack fewer than a thirty day period in the past that shut down Universal Health Companies, a Fortune-500 owner of a nationwide network of hospitals.

Sopra Steria is at this time doing the job to get well its methods “for a return to standard as swiftly as possible” after the attack, as well as making “every effort and hard work … to guarantee small business continuity,” officers said in a assertion. The enterprise is doing the job with authorities on the subject as perfectly as being in touch with shoppers and partners.

However, it’s unlucky that a organization that specializes in IT services and cybersecurity would retain the community in the dark about critical particulars of what went down for the duration of the attack and how it may well impact their affiliate marketers, observed Chloe Messdaghi, vice president of technique for Position3 Security.

“One detail that is disappointing on the other hand is that Sopra Steria didn’t inform its prospects in their public notification of particularly what types of data had been exposed,” she said in an e-mail to Threatpost. “They also did not give any advice on the sorts of attack attempts that finish customers whose info was uncovered may possibly expect and need to be geared up to spot. Individuals probable attack tactics are dependent on the info exposed.”

This type of transparency with clients who could have been influenced and exposed to risk is specifically essential for companies that specialize in IT solutions to uphold in these instances, Messdaghi stated.

“As a electronic transformation business, Sopra Steria is no question aware of these risks,” she mentioned. “It’s crucially essential that they share them, and immediately, with people whose facts was exposed.”


Some parts of this write-up are sourced from:
threatpost.com

Previous Post: «Cyber Security News #SecTorCa: The Paramedic’s Guide to Surviving Cybersecurity
Next Post: #SecTorCa: Tech for Good, and Bad Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fronton IOT Botnet Packs Disinformation Punch
  • SIM-based Authentication Aims to Transform Device Binding Security to End Phishing
  • New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild
  • Open source packages with millions of installs hacked to harvest AWS credentials
  • DOE ‌‌‌‌‌‌‌‌‌‌‌‌‌‌‌funds‌ ‌development of Qunnect’s Quantum Repeater
  • Cabinet Office Reports 800 Missing Electronic Devices in Three Years
  • Malware Analysis: Trickbot
  • Conti Ransomware Operation Shut Down After Splitting into Smaller Groups
  • US Car Giant General Motors Hit by Cyber-Attack Exposing Car Owners’ Personal Info
  • Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Copyright © TheCyberSecurity.News, All Rights Reserved.