According to various media, the French defense and technology group Thales announced that the hacker group LockBit 3.0 claims to have stolen some of their data and is now threatening to publish it on the dark web.
Thales is reported to have said that the blackmail and ransomware group LockBit 3.0 has announced that it will publish the captured data on the dark web on November 7th. However, Thales added that no direct ransom demand has been received so far. The weapons manufacturer immediately launched an internal investigation and informed the French national cyber security authority ANSSI. A report to the police has not yet been made. According to Thales, the hackers have not yet provided any proof that they have captured any Thales data.
Internal warnings in advance
Probably already warned earlier this year Thales internally, employees said the company was generally more vulnerable to cyberattacks as many people work from home using their personal devices. As a source, the company cited a 2021 FBI Internet Crime Report. It found that cybercrime increases as a direct result of corporate employees working from home. This rising trend has been fueled by lockdowns caused by the Covid-19 pandemic. For example, some employees are said to have used personal computers and mobile devices that are not equipped with enterprise-level security.
Now it remains to be seen what the LockBit 3.0 hacker group will release. So far the group is one of the most successful APT groups. The malware trend report from Malwarebytes proves this again and again. There LockBit - in all variants 3.0, Black, etc. - has been the number 1 threat player for months. LockBit (3.0) tops the list of ransomware attacks by group, between March and August 2022 with 430 known attacks. Conti follows in second place with only 2 attacks.