The French construction firm has detected some malicious behaviours in their systems and have identified the same as a ransomware attack on their machines late last week. Bouygues have temporarily shut down their systems until the attack is resolved and have also informed the media that their officials are fully focussed to fix things as quickly as possible. This multi-national company has also mentioned that their construction projects are running smoothly and their normal operations are no way affected, thus our users and customers need not worry about the ransomware attack. Bouygues have given briefed about the attack in their press release on Feb 5th, 2020.
It is believed that the Maze ransomware group is the one behind Bouygues ransomware attack. Bouygues has its headquarters in France, however they are owning multiple civil projects in Australia, like the Metro Tunnel project in Melbourne, North Connex in Sydney, Go Between Bridge in Brisbane and more. The Maze ransomware group have also victimized ‘United Imaging’ another MNC firm with their malicious intents.
Maze is a cybercriminal organization that has been targeting organizations in the US with their ransomware attacks. This group has been behind the attack on City of Pensacola, Southwire, Allied Universal and more. Their prime motive is encrypting the sensitive data from the companies and demanding a ransom.
Maze also had a website, which will display the list of companies that become victims to their ransomware attacks. If the company does not pay the requested ransom, then those data encrypted or stolen from those companies will go public. To be noted, this group has also been the ones regarding the attacks on the number of law firms.
Organizations need to first understand there is no way a company could be completely secured against cyberattacks, as no vendor or tool can afford 100 percent cybersecurity. The best practices and robust policies could only make your company less of a favourite to cyber criminals. Below mentioned seven best practices can keep your organizations proactively secured against ransomware attacks,
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
Find the top 5 IAM software solutions, explore their features, and find the best tools…
MDM software is used to manage smartphones, tablets, laptops, kiosk devices and iPads and more.…
Discover the top 5 Scalefusion alternatives for MDM, offering better features, scalability, and integration for…
Compare Okta and OneLogin: a detailed guide on features, pricing, customer base, security, and more…