The French construction firm has detected some malicious behaviours in their systems and have identified the same as a ransomware attack on their machines late last week. Bouygues have temporarily shut down their systems until the attack is resolved and have also informed the media that their officials are fully focussed to fix things as quickly as possible. This multi-national company has also mentioned that their construction projects are running smoothly and their normal operations are no way affected, thus our users and customers need not worry about the ransomware attack. Bouygues have given briefed about the attack in their press release on Feb 5th, 2020.
It is believed that the Maze ransomware group is the one behind Bouygues ransomware attack. Bouygues has its headquarters in France, however they are owning multiple civil projects in Australia, like the Metro Tunnel project in Melbourne, North Connex in Sydney, Go Between Bridge in Brisbane and more. The Maze ransomware group have also victimized ‘United Imaging’ another MNC firm with their malicious intents.
Maze is a cybercriminal organization that has been targeting organizations in the US with their ransomware attacks. This group has been behind the attack on City of Pensacola, Southwire, Allied Universal and more. Their prime motive is encrypting the sensitive data from the companies and demanding a ransom.
Maze also had a website, which will display the list of companies that become victims to their ransomware attacks. If the company does not pay the requested ransom, then those data encrypted or stolen from those companies will go public. To be noted, this group has also been the ones regarding the attacks on the number of law firms.
Organizations need to first understand there is no way a company could be completely secured against cyberattacks, as no vendor or tool can afford 100 percent cybersecurity. The best practices and robust policies could only make your company less of a favourite to cyber criminals. Below mentioned seven best practices can keep your organizations proactively secured against ransomware attacks,
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…