www-lemagit-fr.translate.goog Open in urlscan Pro
2a00:1450:400d:80a::2001  Public Scan

URL: https://www-lemagit-fr.translate.goog/actualites/252523470/Alphv-BlackCat-revendique-une-cyberattaque-contre-Unisys?_x_tr_sl=auto&_x_t...
Submission Tags: falconsandbox
Submission: On September 23 via api from US — Scanned from FR

Form analysis 1 forms found in the DOM

GET https://www.lemagit.fr/recherche/question

<form action="https://www.lemagit.fr/recherche/question" method="get" class="header-search">
  <label for="header-search-input" class="visuallyhidden">
    <font style="vertical-align: inherit;">
      <font style="vertical-align: inherit;">Search on LeMagIT</font>
    </font>
  </label>
  <input class="header-search-input lemag" id="header-search-input" type="text" name="q" placeholder="Search on LeMagIT">
  <button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>

Text Content

Search on LeMagIT
Register now.
Login Subscribe
 * contacts
 * Cookies
 * Partners calendar
 * PDF Resources
 * Infographic: IT Salary Study 2022

RSS
 * Categories
    * News
    * IT projects
    * IT advice
    * opinions
    * Essential Guides
    * Dessins
    * Définitions IT

 * Technologies
   Applications d'entreprise Retour
    * Applications métiers (SIRH, Finance, Field Services, Supply chain, etc.)
    * ERP, PGI, solutions sectorielles (verticaux)
    * Gestion de contenus (GED, DAM, CMS, etc.), e-signature et partage de
      fichiers
    * CRM, Customer Experience (CX), Digital Marketing
    * ITSM, Case Management, Enterprise Service Management
   
   Cybersécurité Retour
    * Cyberdéfense
    * Cyberdélinquance
    * DevSecOps
    * Gestion de la sécurité (SIEM, SOAR, SOC)
    * Gestion des accès (MFA, FIDO, SSO, SAML, IDaaS, CIAM)
    * Gestion des vulnérabilités et des correctifs (patchs)
    * Gestion d’identités (IGA, PAM, Bastion, PASM, PEDM)
    * IA appliquée à la Cybersécurité
    * Menaces, Ransomwares, DDoS
    * Protection du terminal et EDR
    * Environnements virtuels et des conteneurs
    * Sécurité du Cloud, SASE
    * Sécurité réseau (IDS, XDR, etc.)
   
   Datacenter Retour
    * Administration systèmes
    * Administration du Cloud
    * Architecture de Datacenter
    * Continuité d’activité, Sécurité physique
    * Gestion du Datacenter
    * Green IT
    * HPC
   
   Economie et Régulation Retour
    * Constructeurs
    * Editeurs
    * Equipementiers
    * Fournisseurs Cloud
    * Opérateurs, Intégrateurs
    * Réglementations et Souveraineté
    * SSII, ESN
   
   Emploi Retour
    * Formation
    * Recrutement
    * Rémunération
   
   Gestion des données Retour
    * Base de données
    * Big Data et Data lake
    * Datawarehouse
    * Formats et Archivage
    * IA et Data Science
    * MDM, Gouvernance, Qualité
    * BI, Analytique, Dataviz, Décisionnel
   
   IT de l'utilisateur Retour
    * Accès distants (VPN, ZTNA)
    * Administration des terminaux (MDM, EMM, UEM, BYOD)
    * Bureautique, Suites de productivité
    * Digital Workplace, Portails, Réseaux Sociaux d’Entreprise
    * Outils Collaboratifs (messagerie, visio, communication unifiée)
    * PC, Mac, terminaux et périphériques
    * Poste de travail virtuel (VDI, DaaS)
   
   Middleware et Développement Retour
    * API
    * Architectures logicielles
    * BPM, RPA
    * DevOps et Agilité
    * Développement mobile
    * Langages
    * Middleware et intégration de données
    * Open Source
    * Outils de développement
    * Plateformes IoT
   
   Réseaux et Télécoms Retour
    * Administration de réseaux
    * Connectivité, Accès Internet
    * Internet des objets
    * LAN, Wifi
    * ToIP - VoIP
    * Virtualisation de réseaux, SDN, Réseau pour conteneurs, NFV
    * WAN, SDWAN, SASE
   
   Serveurs et Hardware Retour
    * ARM
    * Infrastructure hyperconvergée
    * Mainframes
    * Mini serveurs, Edge Computing
    * Processeurs et composants
    * Unix (Risc et Itanium)
    * Virtualisation de serveurs
    * x86
   
   Services Cloud Retour
    * Applications et services
    * IaaS
    * PaaS
    * SaaS
   
   Stockage Retour
    * Administration du stockage
    * Archivage
    * Backup, Sauvegardes
    * Backup en Cloud
    * Disques durs, SSD et Unités de stockage
    * PRA, Reprise après incident
    * SAN et NAS
    * Software Defined Storage
    * Stockage de conteneurs
    * Stockage en Cloud
    * Stockage objet
    * Virtualisation du stockage
   
   Systèmes d'exploitation Retour
    * Linux
    * MacOS
    * OS mobiles et OS embarqués
    * Solaris
    * Unix
    * Windows
    * zOS
   
   Sélectionner une technologie
    * Applications d'entreprise
    * Cybersécurité
    * Datacenter
    * Economie et Régulation
    * Emploi
    * Gestion des données
    * IT de l'utilisateur
    * Middleware et Développement
    * Réseaux et Télécoms
    * Serveurs et Hardware
    * Services Cloud
    * Stockage
    * Systèmes d'exploitation

 * Premium Pro+ content
    * E-handbooks
    * E-zines
    * Livres Blancs
    * Tout PRO+
    * A propos de PRO+
    * Espace partenaires

 * Follow us:
 * 
 * 
 * 

 * ComputerWeekly.com
 * ComputerWeekly.com.br
 * ComputerWeekly.de
 * ComputerWeekly.es
 * MicroScope.co.uk



Lana - stock.adobe.com

Lana - stock.adobe.com

News


ALPHV/BLACKCAT CLAIM CYBERATTACK AGAINST UNISYS




FOR LESS THAN AN HOUR, THE RANSOMWARE FRANCHISE CLAIMED TO HAVE HAD ACCESS TO
THE SOURCE CODE REPOSITORIES OF ALL UNISYS SOFTWARE PRODUCTS, IN PARTICULAR THE
SEALTH SECURITY SUITE. AND TO ACCUSE THE CISO OF TRYING TO HIDE THE BREACH.

 * Partager avec votre réseau:
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 *  * 
    * 
    * 
    * 


by
 * Valéry Rieß-Marchive, Editor-in-Chief

Published on: August 03, 2022

The Alphv mafia franchise, also known as BlackCat , briefly claimed
responsibility for a cyberattack on Unisys on August 3, 2022. It was deleted
after less than an hour.



Alphv operators claimed to have had access to “all source code repositories for
all products, including the full source code of Stealth Security”. Enough to
allow, according to cybercriminals, to “deploy agents, servers, use the API,
etc. ". Source code screenshots backed up their claims. One of them could have
been linked to the Stealth(identity) SaaS solution, or even its mobile client
uAuthenticator.

Unisys' Stealth portfolio includes solutions for identity-based
microsegmentation and more broadly Trustless Network Access (ZTNA), Multi-Factor
Authentication (MFA), including for hybrid cloud environments.

We've reached out to Unisys' communications department and will be sure to
update this article when their feedback comes in.

The Alphv ransomware franchise dated its claim to July 28. But it is difficult
to imagine that its publication, even brief, on this August 3, is the effect of
a simple coincidence: Unisys must publish today its quarterly results and has
planned a press conference, about them. , for tomorrow, August 4th.

LeMagIT

Excerpt from Alphv/BlackCat claim against Unisys.


L’ironie n’échappera à personne : le site Web des solutions Stealth d’Unisys
souligne que « les cybercriminels vous frappent là où ça fait mal ». Dans le cas
présent, ce pourrait être « là où et quand ça fait mal ».

La potentielle compromission de code source fermé rappelle d’autres
cyberattaques, à l’instar de Solarwinds, mais également, dans le domaine
simplement crapuleux, Exagrid, qui avait été attaqué par le groupe Conti.

It was at the very beginning of December that the MalwareHunterTeam collective
and Recorded Future  discovered  the BlackCat ransomware. The teams of the
second noted  advertisements  for the recruitment of trustees on two forums
regularly frequented by cybercriminals. AdvIntel believes that associates of the
late Conti franchise are now working under the Alphv/BlackCat banner .



TO DEEPEN ON THREATS, RANSOMWARE, DDOS

 * RANSOMWARE: A MONTH OF JULY IN CONTINUITY
   
   
   By: Valéry Rieß-Marchive

 * CUSTOMERS AND EMPLOYEES OF A BLACKCAT VICTIM WERE ABLE TO VERIFY IF THEY WERE
   CONCERNED
   
   
   By: Valéry Rieß-Marchive

 * RANSOMWARE: A MONTH OF MAY MARKED BY THE DECLINE OF THE THREAT ACROSS THE
   ATLANTIC
   
   
   By: Valéry Rieß-Marchive

 * AKKA TECHNOLOGIES WAS HIT WITH BLACKCAT RANSOMWARE
   
   
   By: Valéry Rieß-Marchive

News
 * Ransomware: two mornings to better understand the threat and protect yourself
   against it
 * Servers: Lenovo unveils 11 configurations available in 50 versions
 * DBaaS: Aiven launches its managed version of the ClickHouse data warehouse
 * See all News

Download Safety Information
 * In this number:
   * Why your business needs a SOC service
   * Faurecia puts its EDR in the front line against attackers
   * SIEM: Louis Dreyfus Company migrates to Microsoft Sentinel
   Download this edition

Read also
 * Ransomware: a (deceptively?) quiet start to the year – LeMagIT
 * Ransomware: a month of April marked by several ... – LeMagIT
 * Cybercrime: what to expect from the conflict that... – LeMagIT



 * About
 * Charter of ethics and deontology
 * Meet the journalists
 * contacts
 * Use of Cookies
 * Reprints

 * Advertisers
 * Partners
 * Press kit
 * Diary
 * Our Journalists and Experts
 * Technologies

 * E-Handbooks
 * IT advice
 * opinions
 * Essential Guides
 * IT projects

All rights reserved, Copyright 2007 - 2022 , TechTarget Privacy Cookies Settings






Close




ORIGINAL TEXT


Contribute a better translation

--------------------------------------------------------------------------------