Cyber security news for all

More

    Sopra Steria was encrypted with Ryuk ransomware

    Last week, there was a successful ransomware on the servers of the French provider Sopra Steria. In an extremely brief statement, the company only confirms a ransomware on the IT system. IT has taken security measures to contain the dangers and is working to ensure business continuity.

    Sopra Steria Falls Victim To Ryuk

    In a concise statement, Sopra Steria says that you should listen hard – All rights were changed to control business continuity. The company is in close contact with customers as well as the authorities. The company recognized that they had not included any other associated ones after the cyber attack.

    Sopra Steria

    However, the company did not provide any data of the ransomware when asked. With reference to its own sources, the company’s domains were hacked using Ryuk ransomware. The extent of the encryption and the question of whether information was also extracted beforehand is not yet known. Sopra Steria sees itself as a leading consultant and has almost 50,000 employees. Sopra Steria is an important company to drive the transformation of its customers.

    The vulnerability, which is classified as a risk, has been known since August when Microsoft published corresponding gaps. Exploits have been known since September and there have been numerous warnings from security companies to close the vulnerability immediately. At the same time, CISA published an emergency policy and gave the authorities four days to close the vulnerability.

    The hackers used the company’s IT to simulate data leak on their own network, to see defense measures and to increase their own security. After penetrating the domain, some programs were used to move the malware in the network. The cyber attacks took place before October, and that the data leak in devices were encrypted at lightning speed.

    Recent Articles

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here