By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Babuk targets French telecommunications giant
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Babuk targets French telecommunications giant
News

Babuk targets French telecommunications giant

News Room
Last updated: 2025/03/21 at 9:48 AM
News Room Published 21 March 2025
Share
SHARE

What would a cyberattack on your local government look like? Drata analyzed threat trends to break down the growing issue.
THOMAS SAMSON/AFP // Getty Images

Following recent reports that ransomware group Babuk has breached French telecommunications giant Orange, stealing 4TB of data and threatening its release, Ronen Ahdut, Head of CyOps at Cynet pinpoints weaknesses with the governance systems in many businesses, highlighting vulnerabilities to such attacks.

This attack underscores the growing trend of repeat victimization in ransomware campaigns, as well as the financial motivations that drive threat actors to continuously target highprofile organizations.

Ahdut begins by summarising the incident: “This March incident, following a similar ransomware attack on Orange Romania by HELLCAT group in February 2025, highlights the persistent threat landscape faced by large organizations.”

With the nature of this incident, Ahdut charts several inherent weaknesses: “While Orange, with its multiple locations, thousands of employees, and publicly disclosed breach data, presents a broader attack surface than some, it’s important to note that ransomware operators are fundamentally opportunistic. They seek financial gain and will exploit any available vulnerability, regardless of the specific target. If a new vulnerability emerges, they will act swiftly, and the target can vary significantly.”

Other firms should not feel complacent as a result of the cyberattack, Ahdut cautions: “While Orange’s size and history may provide numerous potential attack vectors, making it a broader target, it’s as legitimate a target as any other large organization due to the general nature of ransomware operations.”

In terms of the threat actor, Ahdut identifies: “Babuk, the group allegedly behind the attack, has undergone several transformations since its original form in 2021. After the release of its source code on underground forums, various actors adapted it into their own ransomwareasaservice (RaaS) programs, leading to the emergence of Babuk2.”

This introduces a new challenge to threat landscape: “This new iteration has published information on more than 45 victims in March 2025 alone, frequently targeting organizations that had previously suffered breaches. While the primary goal of these attacks is financial, the collateral damage extends to institutions, businesses, and individuals, as seen in Romania, where the breach impacted institutions, city halls, schools, hospitals, banks, insurers, transport and energy companies, as well as individuals.”

There is more to the incident which Ahdut reveals: “Additionally, Babuk has used Orange’s name on its website to bolster its credibility in underground markets and attract more affiliates to its program, demonstrating how threat actors leverage highprofile attacks for publicity.”

There are measure, nonetheless, that firms cab adopt to repel such attacks. Ahdut recommends: “To mitigate future threats, organizations must adopt a multilayered security approach. Implementing endpoint detection and response (EDR/XDR), monitoring firewall logs, and deploying data loss prevention (DLP) solutions are crucial for early threat detection.”

Ahdut also puts forward: “Companies should also establish a Cyber Incident Response Team (CIRT), conduct regular risk assessments, and train employees on cybersecurity best practices. It is not a question of if, but when an attack will occur, making proactive planning essential. A wellstructured Incident Response Plan (IRP) and secure data backups can help organizations prepare for inevitable cyberattacks and reduce their operational impact.”

However, preparation alone is not enough. Ahdut advises: “Effective Cyber Threat Intelligence (CTI) can help organizations anticipate threats, respond faster, and adapt smarter during an incident. Understanding who the adversary is, what their tactics are, and which emerging threats are relevant to a specific industry allows organizations to tailor defences accordingly, proactively mitigating risks before they escalate into breaches.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Opinion | It May Not Be Brainwashing, but It’s Not Democracy, Either
Next Article 10 Best Agenda and Meeting Management Software in 2025
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Best Air Mattresses of 2025 We Tested
News
The best deals on MacBooks right now
News
Why Human Touch Still Matters in Automated Process Testing | HackerNoon
Computing
A Fully Customized Fit for USB-C Earbuds
News

You Might also Like

News

The Best Air Mattresses of 2025 We Tested

4 Min Read
News

The best deals on MacBooks right now

22 Min Read
News

A Fully Customized Fit for USB-C Earbuds

1 Min Read
News

Expansion of London’s NHS drone delivery network unveiled – UKTN

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?