Ransomware attack on French IT service provider Inetum

Sicherheit (Pexels, allgemeine Nutzung)[German]As of Sunday, December 19, 2021, there appears to have been a successful cyberattack using ransomware against French IT services provider Inetum. The attack affected the group's IT functions in France, but not in other countries, the company wrote. With 2 billion euros in annual revenue and 19,000 employees (2018), that's already one of the big ones in the industry.


Advertising

I came across this security incident via the following tweet. But the incident is also made public by Inetum here.

Ransomware-Angriff auf französischen IT-Dienstleister Inetum

A Dec. 20 news release states that Inetum was hit by a ransomware infection on Sunday, Dec. 19, 2021, which affected operations in France. To protect customers, employees and partners, all affected sites – communication networks and servers – were isolated to contain the spread of the malware. At the same time, a crisis team was set up to coordinate further actions and analyze the incident.

The company later announced that sites outside France were not affected. None of the main infrastructures, communication and collaboration tools or delivery operations for Inetum customers were affected. Within the affected area, all servers were isolated and customers' VPNs were turned off.

Following these initial measures, and as a precautionary measure, the Group's crisis team requested Inetum's operational teams to disable certain customer connections that were considered sensitive at the time. At this stage, no further abnormal activity has been detected.


Advertising

Inetum said it is an agile IT services company that provides digital services and solutions. The group operates globally, helping businesses and institutions digitize. The group operates in more than 26 countries, employs nearly 27,000 people and generated revenues of €1.966 billion in 2020.


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *