Friday, March 21, 2025
HomeCyber Security NewsBabuk Ransomware Group Claims Attack on Telecommunication Firm Orange

Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange

Published on

SIEM as a Service

Follow Us on Google News

The Babuk ransomware group has recently claimed responsibility for a sophisticated cyberattack on Orange, a leading global telecommunications company.

According to an exclusive interview with SuspectFile.com, Babuk exploited a zero-day vulnerability in Orange’s systems to gain initial access to the company’s network.

This vulnerability allowed them to exfiltrate sensitive data, which was later sold to a third party for $10,000.

The attack highlights the evolving nature of cybercrime and the vulnerabilities even large companies face despite significant cybersecurity investments.

Details of the Attack

Babuk stated that the attack was planned over a long period and involved exploiting a zero-day vulnerability, which allowed them to remain undetected in Orange’s systems for several months.

The group claimed that there were no significant technical challenges during the attack, raising concerns about Orange’s threat detection capabilities.

The consequences of the attack are multifaceted, impacting Orange economically, reputationally, and operationally.

Babuk also planned a second attack aimed at encrypting Orange’s entire infrastructure but was partially thwarted by the company’s efforts to mitigate the damage.

Aftermath and Response

Orange’s public response to the attack was described as “normal” by Babuk, but behind the scenes, the company took drastic measures to prevent further intrusions.

Babuk did not have direct contact with Orange regarding a ransom demand; instead, the stolen data was sold to an unknown buyer who attempted to monetize it through a ransom demand.

However, this attempt failed, and the data was eventually published on BreachForums.

According to SuspectFile Report, the attack specifically targeted Orange Romania, a strategic hub in the European telecommunications market.

Babuk’s attack on Orange underscores the evolving landscape of ransomware attacks, which are becoming increasingly sophisticated and targeted.

The group expressed intentions to strengthen its infrastructure, drawing inspiration from well-established groups like LockBit and RansomHub.

This trend suggests that ransomware attacks will continue to pose significant threats to companies worldwide, emphasizing the need for proactive and continuously updated defensive strategies to counter these evolving threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension

The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware,...

I-SOON’s ‘Chinese Fishmonger’ APT Targets Government Entities and NGOs

In a recent development, the U.S. Department of Justice unsealed an indictment against employees...

Apple Sued in Federal Court for Delaying Apple Intelligence Features  

Tech giant Apple has found itself at the center of a new legal battle...

Caido v0.47.0 Released – A Web Pentesting Tool Alternative to Burp Suite

Caido has unveiled version 0.47.0 of its web pentesting tool, cementing its position as...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension

The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware,...

I-SOON’s ‘Chinese Fishmonger’ APT Targets Government Entities and NGOs

In a recent development, the U.S. Department of Justice unsealed an indictment against employees...

Apple Sued in Federal Court for Delaying Apple Intelligence Features  

Tech giant Apple has found itself at the center of a new legal battle...