Sopra Steria confirms it was hit by new Ryuk ransomware variant
The French IT services firm has admitted it will take "weeks" for business operations to return to normal
IT services giant Sopra Steria has admitted that it will take "weeks" for the company to recover after it was hit by a serious cyber attack last week.
In a statement released on Monday, the French-headquartered IT firm confirmed that it was struck by a new variant of the infamous Ryuk ransomware, which it claims was previously unknown to antivirus software providers and security agencies.
Ryuk, a popular strain of malware that is said to be targeting some 20 organisations a week, which recently forced a number of US hospitals offline, is believed to have compromised Sopra Steria's Active Directory infrastructure and encrypted portions of the company's network.
"Sopra Steria’s investigation teams immediately provided the competent authorities with all information required," the company said. "The Group was able to quickly make this new version’s virus signature available to all antivirus software providers, in order for them to update their antivirus software."
"Moreover, it has also been established that the cyber attack was only launched a few days before it was detected."
While not immediately detected, Sopra Steria says it was able to contain the malware to a "limited part" of the company's infrastructure, and said it has not identified any leaked data or damage caused to its customers’ information systems.
However, the company has admitted that it will take a "few weeks" for a "return to normal".
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Having analysed the attack and established a remediation plan, the Group is starting to reboot its information system and operations progressively and securely, as of today," it added.
Somewhat ironically, Sopra Steria has a specialised cyber security brand that promises to help customers “protect sensitive information, and prevent costly data breaches.”
The company is also one of the founding members of France’s Cyber Campus, an industry-led initiative to spread cyber security awareness, training and product sales.
RELATED RESOURCE
A guide to becoming cloud-native smart and secure
The transcendence of cloud-native application development
Commenting on the attack, security analyst Graham Cluley said: "Although it might be easy for those unaffected to be bemused by the irony of a company like Sopra Steria being hit by ransomware, it’s really a reminder that any organisation could potentially fall victim to a determined attack.
"All companies, big and small, need to be on their guard and put defences in place to reduce the chances of becoming the next victim."
Carly Page is a freelance technology journalist, editor and copywriter specialising in cyber security, B2B, and consumer technology. She has more than a decade of experience in the industry and has written for a range of publications including Forbes, IT Pro, the Metro, TechRadar, TechCrunch, TES, and WIRED, as well as offering copywriting and consultancy services.
Prior to entering the weird and wonderful world of freelance journalism, Carly served as editor of tech tabloid The INQUIRER from 2012 and 2019. She is also a graduate of the University of Lincoln, where she earned a degree in journalism.
You can check out Carly's ramblings (and her dog) on Twitter, or email her at hello@carlypagewrites.co.uk.
-
‘Perfect’ Zero Trust is killing your mid-market productivitySponsored Security theory often collapses under real-world deadlines. It’s time for a more auditable, “human-centric” approach to privileged access management
-
Increased AI use means developers spend more time reviewing code than everNews While AI is improving productivity and efficiency, many developers are caught up in a vicious cycle of code reviews and bug hunting
-
Instructure chose to a pay ransom following the Canvas cyber attack – research shows more than half of security leaders would follow suitAnalysis Opting to pay ransoms creates huge risks for enterprises – you’re relying on the word of criminals
-
Ransomware negotiator sentenced for role in major cyber crime groupNews Deniss Zolotarjovs was a key player in a group associated with Conti
-
Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitationNews A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation
-
Security leaders overconfident about ransomware recoveryNews Few manage to recover all their data, and many experience business disruption
-
German authorities want your help finding the hackers behind GandCrab and REvilNews Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes
-
The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in lifeNews With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion
-
Ransomware gangs are using employee monitoring software as a springboard for cyber attacksNews Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp
-
Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoingNews Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos
