Sopra Steria confirms it was hit by new Ryuk ransomware variant
The French IT services firm has admitted it will take "weeks" for business operations to return to normal


IT services giant Sopra Steria has admitted that it will take "weeks" for the company to recover after it was hit by a serious cyber attack last week.
In a statement released on Monday, the French-headquartered IT firm confirmed that it was struck by a new variant of the infamous Ryuk ransomware, which it claims was previously unknown to antivirus software providers and security agencies.
Ryuk, a popular strain of malware that is said to be targeting some 20 organisations a week, which recently forced a number of US hospitals offline, is believed to have compromised Sopra Steria's Active Directory infrastructure and encrypted portions of the company's network.
"Sopra Steria’s investigation teams immediately provided the competent authorities with all information required," the company said. "The Group was able to quickly make this new version’s virus signature available to all antivirus software providers, in order for them to update their antivirus software."
"Moreover, it has also been established that the cyber attack was only launched a few days before it was detected."
While not immediately detected, Sopra Steria says it was able to contain the malware to a "limited part" of the company's infrastructure, and said it has not identified any leaked data or damage caused to its customers’ information systems.
However, the company has admitted that it will take a "few weeks" for a "return to normal".
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Having analysed the attack and established a remediation plan, the Group is starting to reboot its information system and operations progressively and securely, as of today," it added.
Somewhat ironically, Sopra Steria has a specialised cyber security brand that promises to help customers “protect sensitive information, and prevent costly data breaches.”
The company is also one of the founding members of France’s Cyber Campus, an industry-led initiative to spread cyber security awareness, training and product sales.
RELATED RESOURCE
A guide to becoming cloud-native smart and secure
The transcendence of cloud-native application development
Commenting on the attack, security analyst Graham Cluley said: "Although it might be easy for those unaffected to be bemused by the irony of a company like Sopra Steria being hit by ransomware, it’s really a reminder that any organisation could potentially fall victim to a determined attack.
"All companies, big and small, need to be on their guard and put defences in place to reduce the chances of becoming the next victim."
Carly Page is a freelance technology journalist, editor and copywriter specialising in cyber security, B2B, and consumer technology. She has more than a decade of experience in the industry and has written for a range of publications including Forbes, IT Pro, the Metro, TechRadar, TechCrunch, TES, and WIRED, as well as offering copywriting and consultancy services.
Prior to entering the weird and wonderful world of freelance journalism, Carly served as editor of tech tabloid The INQUIRER from 2012 and 2019. She is also a graduate of the University of Lincoln, where she earned a degree in journalism.
You can check out Carly's ramblings (and her dog) on Twitter, or email her at hello@carlypagewrites.co.uk.
-
M&S suspends online sales as 'cyber incident' continues
News Marks & Spencer (M&S) has informed customers that all online and app sales have been suspended as the high street retailer battles a ‘cyber incident’.
By Ross Kelly
-
Manners cost nothing, unless you’re using ChatGPT
Opinion Polite users are costing OpenAI millions of dollars each year – but Ps and Qs are a small dent in what ChatGPT could cost the planet
By Ross Kelly
-
Ransomware attacks are rising — but quiet payouts could mean there's more than actually reported
News Ransomware attacks continue to climb, but they may be even higher than official figures show as companies choose to quietly pay to make such incidents go away.
By Nicole Kobie
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz