Thursday, March 20, 2025
HomeCyber Security NewsBabuk Ransomware Group Claims Attack on Telecommunication Firm Orange

Babuk Ransomware Group Claims Attack on Telecommunication Firm Orange

Published on

SIEM as a Service

Follow Us on Google News

The Babuk ransomware group has recently claimed responsibility for a sophisticated cyberattack on Orange, a leading global telecommunications company.

According to an exclusive interview with SuspectFile.com, Babuk exploited a zero-day vulnerability in Orange’s systems to gain initial access to the company’s network.

This vulnerability allowed them to exfiltrate sensitive data, which was later sold to a third party for $10,000.

The attack highlights the evolving nature of cybercrime and the vulnerabilities even large companies face despite significant cybersecurity investments.

Details of the Attack

Babuk stated that the attack was planned over a long period and involved exploiting a zero-day vulnerability, which allowed them to remain undetected in Orange’s systems for several months.

The group claimed that there were no significant technical challenges during the attack, raising concerns about Orange’s threat detection capabilities.

The consequences of the attack are multifaceted, impacting Orange economically, reputationally, and operationally.

Babuk also planned a second attack aimed at encrypting Orange’s entire infrastructure but was partially thwarted by the company’s efforts to mitigate the damage.

Aftermath and Response

Orange’s public response to the attack was described as “normal” by Babuk, but behind the scenes, the company took drastic measures to prevent further intrusions.

Babuk did not have direct contact with Orange regarding a ransom demand; instead, the stolen data was sold to an unknown buyer who attempted to monetize it through a ransom demand.

However, this attempt failed, and the data was eventually published on BreachForums.

According to SuspectFile Report, the attack specifically targeted Orange Romania, a strategic hub in the European telecommunications market.

Babuk’s attack on Orange underscores the evolving landscape of ransomware attacks, which are becoming increasingly sophisticated and targeted.

The group expressed intentions to strengthen its infrastructure, drawing inspiration from well-established groups like LockBit and RansomHub.

This trend suggests that ransomware attacks will continue to pose significant threats to companies worldwide, emphasizing the need for proactive and continuously updated defensive strategies to counter these evolving threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...