French IT services company Inetum Group revealed just before Christmas that it had fallen victim to a ransomware attack, but claimed that impact on its operations was limited.
Inetum, which operates in 26 countries and has roughly 27,000 employees worldwide, said the attack took place on December 19. The company said it acted quickly, isolating the affected “operational sites,” including networks and services.
According to the company, only its operations in France were affected by the cyberattack, with other operations remaining unharmed.
“None of the main infrastructures, communication, collaboration tools or delivery operations for Inetum clients has been affected,” the company said.
In addition to isolating the affected servers, the company switched off client VPNs, and also disabled certain client interconnections that were considered sensitive at the time.
The company says that it has managed to safeguard all delivery operations and that messaging and collaboration systems haven’t been impacted in the incident.
The attack, Inetum says, was not related to the recent Log4j vulnerability.
Inetum also says it has been able to identify the signature of the ransomware, but did not disclose which malware family was involved. Reports suggest the BlackCat ransomware was involved.
Also referred to as ALPHV and Noberus, BlackCat stands out from the crowd because it is written in Rust, being the first ransomware family coded using this programming language.
Related: Sophisticated Noberus Ransomware First to Be Coded in Rust
Related: PYSA Dominated the Ransomware Landscape in November: Report
Related: 5 Ways to Reduce the Risk of Ransomware to Your OT Network