Heimdal
article featured image

Contents:

The Lockbit 3.0 ransomware group began leaking a 9.5 Gb archive file that is presumably stolen information from the Thales Group, after the company refused to pay the ransom.

Thales Group is a French multinational high-tech company, with over 81,000 employees worldwide. The company is known for investing in digital and “deep tech” innovations such as: big data, artificial intelligence, connectivity, cybersecurity, and quantum technology.

What Happened?

After adding Thales to its list of victims on October 31, the Lockbit 3.0 group threatened to release stolen data on November 7, 2022, if the company did not pay the ransom.

Thales LockBit Ransomware

Source

The deadline was met, and the ransomware gang kept its word and followed through with its threats. The organization first began releasing the company’s private information on the 11th of November, according to Security Affairs.

Thales Lockbit Ransom Note

Source

Thales Group’s Position

The French Company revealed last week that it was aware of the ransomware gang claiming to have stolen some of its data, but clarified that “there has been no intrusion of its IT systems”.

Thales security experts have identified one of the two likely sources of the theft, which has been confirmed through the user account of a partner on a dedicated collaboration portal. This has led to the disclosure of a limited amount of information.

Source

Thales Group’s complete official position on the ransomware attack is available here.

This is Lockbit’s second cyber attack on Thales this year. In January, when the first incident occurred, the corporation similarly declined to pay the demanded ransom. Hundreds of Zip archives were disclosed by the group at the time, the most current of which was from January 1, 2022. The leaked files included internal code, explains Security Affairs.

These 1,320 files were no longer available for download on Tuesday morning. (…) Thales group acknowledged the exfiltration of data and specified that “most of the stolen files which appear to have been copied from a code repository server (“code repository”), hosting data with a low level of sensitivity and which is external to the group’s main information systems.

Source

If you liked this article, follow us on LinkedInTwitterFacebookYoutube, and Instagram for more cybersecurity news and topics.

Author Profile

Madalina Popovici

Digital PR Specialist

linkedin icon

Madalina, a seasoned digital content creator at Heimdal®, blends her passion for cybersecurity with an 8-year background in PR & CSR consultancy. Skilled in making complex cyber topics accessible, she bridges the gap between cyber experts and the wider audience with finesse.

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE