Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the development of our societies, by placing people at the heart of decision-making.
Early this month, the French defence and technology group confirmed to be aware that the ransomware group LockBit 3.0 claimed to have stolen some of its data.
Thales was added to the list of victims of the Lockbit 3.0 group on October 31, the gang threatened to publish stolen data by November 7, 2022, if the company would have not paid the ransom by the deadline.
The deadline was reached and the ransomware gang maintained its promise and carried out its threats.
On Friday, the group started publishing confidential data stolen from the company. Thales downplayed the incident and explained that the security breach will have no impact on its activities.
This is the second time this year that the Thales was the victim of a cyber attack orchestrated by the Lockbit gang. The first attack took place in January and at the time the company also refused to pay the ransom. At the time, the gang leaked hundreds of Zip archives, the most recent dated January 1, 2022. The leaked files included internal code.
“These 1,320 files were no longer available for download on Tuesday morning. ” reported the French newspaper Le Parisien. “Contacted by Le Parisien, the Thales group acknowledged the exfiltration of data and specified that “most of the stolen files which appear to have been copied from a code repository server (“code repository”), hosting data with a low level of sensitivity and which is external to the group’s main information systems.””
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, Lockbit)