www-lemagit-fr.translate.goog
Open in
urlscan Pro
2a00:1450:400d:80a::2001
Public Scan
URL:
https://www-lemagit-fr.translate.goog/actualites/252523470/Alphv-BlackCat-revendique-une-cyberattaque-contre-Unisys?_x_tr_sl=auto&_x_t...
Submission Tags: falconsandbox
Submission: On September 23 via api from US — Scanned from FR
Submission Tags: falconsandbox
Submission: On September 23 via api from US — Scanned from FR
Form analysis
1 forms found in the DOMGET https://www.lemagit.fr/recherche/question
<form action="https://www.lemagit.fr/recherche/question" method="get" class="header-search">
<label for="header-search-input" class="visuallyhidden">
<font style="vertical-align: inherit;">
<font style="vertical-align: inherit;">Search on LeMagIT</font>
</font>
</label>
<input class="header-search-input lemag" id="header-search-input" type="text" name="q" placeholder="Search on LeMagIT">
<button aria-label="Search" class="header-search-submit"><i class="icon" data-icon="g"></i></button>
</form>
Text Content
Search on LeMagIT Register now. Login Subscribe * contacts * Cookies * Partners calendar * PDF Resources * Infographic: IT Salary Study 2022 RSS * Categories * News * IT projects * IT advice * opinions * Essential Guides * Dessins * Définitions IT * Technologies Applications d'entreprise Retour * Applications métiers (SIRH, Finance, Field Services, Supply chain, etc.) * ERP, PGI, solutions sectorielles (verticaux) * Gestion de contenus (GED, DAM, CMS, etc.), e-signature et partage de fichiers * CRM, Customer Experience (CX), Digital Marketing * ITSM, Case Management, Enterprise Service Management Cybersécurité Retour * Cyberdéfense * Cyberdélinquance * DevSecOps * Gestion de la sécurité (SIEM, SOAR, SOC) * Gestion des accès (MFA, FIDO, SSO, SAML, IDaaS, CIAM) * Gestion des vulnérabilités et des correctifs (patchs) * Gestion d’identités (IGA, PAM, Bastion, PASM, PEDM) * IA appliquée à la Cybersécurité * Menaces, Ransomwares, DDoS * Protection du terminal et EDR * Environnements virtuels et des conteneurs * Sécurité du Cloud, SASE * Sécurité réseau (IDS, XDR, etc.) Datacenter Retour * Administration systèmes * Administration du Cloud * Architecture de Datacenter * Continuité d’activité, Sécurité physique * Gestion du Datacenter * Green IT * HPC Economie et Régulation Retour * Constructeurs * Editeurs * Equipementiers * Fournisseurs Cloud * Opérateurs, Intégrateurs * Réglementations et Souveraineté * SSII, ESN Emploi Retour * Formation * Recrutement * Rémunération Gestion des données Retour * Base de données * Big Data et Data lake * Datawarehouse * Formats et Archivage * IA et Data Science * MDM, Gouvernance, Qualité * BI, Analytique, Dataviz, Décisionnel IT de l'utilisateur Retour * Accès distants (VPN, ZTNA) * Administration des terminaux (MDM, EMM, UEM, BYOD) * Bureautique, Suites de productivité * Digital Workplace, Portails, Réseaux Sociaux d’Entreprise * Outils Collaboratifs (messagerie, visio, communication unifiée) * PC, Mac, terminaux et périphériques * Poste de travail virtuel (VDI, DaaS) Middleware et Développement Retour * API * Architectures logicielles * BPM, RPA * DevOps et Agilité * Développement mobile * Langages * Middleware et intégration de données * Open Source * Outils de développement * Plateformes IoT Réseaux et Télécoms Retour * Administration de réseaux * Connectivité, Accès Internet * Internet des objets * LAN, Wifi * ToIP - VoIP * Virtualisation de réseaux, SDN, Réseau pour conteneurs, NFV * WAN, SDWAN, SASE Serveurs et Hardware Retour * ARM * Infrastructure hyperconvergée * Mainframes * Mini serveurs, Edge Computing * Processeurs et composants * Unix (Risc et Itanium) * Virtualisation de serveurs * x86 Services Cloud Retour * Applications et services * IaaS * PaaS * SaaS Stockage Retour * Administration du stockage * Archivage * Backup, Sauvegardes * Backup en Cloud * Disques durs, SSD et Unités de stockage * PRA, Reprise après incident * SAN et NAS * Software Defined Storage * Stockage de conteneurs * Stockage en Cloud * Stockage objet * Virtualisation du stockage Systèmes d'exploitation Retour * Linux * MacOS * OS mobiles et OS embarqués * Solaris * Unix * Windows * zOS Sélectionner une technologie * Applications d'entreprise * Cybersécurité * Datacenter * Economie et Régulation * Emploi * Gestion des données * IT de l'utilisateur * Middleware et Développement * Réseaux et Télécoms * Serveurs et Hardware * Services Cloud * Stockage * Systèmes d'exploitation * Premium Pro+ content * E-handbooks * E-zines * Livres Blancs * Tout PRO+ * A propos de PRO+ * Espace partenaires * Follow us: * * * * ComputerWeekly.com * ComputerWeekly.com.br * ComputerWeekly.de * ComputerWeekly.es * MicroScope.co.uk Lana - stock.adobe.com Lana - stock.adobe.com News ALPHV/BLACKCAT CLAIM CYBERATTACK AGAINST UNISYS FOR LESS THAN AN HOUR, THE RANSOMWARE FRANCHISE CLAIMED TO HAVE HAD ACCESS TO THE SOURCE CODE REPOSITORIES OF ALL UNISYS SOFTWARE PRODUCTS, IN PARTICULAR THE SEALTH SECURITY SUITE. AND TO ACCUSE THE CISO OF TRYING TO HIDE THE BREACH. * Partager avec votre réseau: * * * * * * * * * * * * by * Valéry Rieß-Marchive, Editor-in-Chief Published on: August 03, 2022 The Alphv mafia franchise, also known as BlackCat , briefly claimed responsibility for a cyberattack on Unisys on August 3, 2022. It was deleted after less than an hour. Alphv operators claimed to have had access to “all source code repositories for all products, including the full source code of Stealth Security”. Enough to allow, according to cybercriminals, to “deploy agents, servers, use the API, etc. ". Source code screenshots backed up their claims. One of them could have been linked to the Stealth(identity) SaaS solution, or even its mobile client uAuthenticator. Unisys' Stealth portfolio includes solutions for identity-based microsegmentation and more broadly Trustless Network Access (ZTNA), Multi-Factor Authentication (MFA), including for hybrid cloud environments. We've reached out to Unisys' communications department and will be sure to update this article when their feedback comes in. The Alphv ransomware franchise dated its claim to July 28. But it is difficult to imagine that its publication, even brief, on this August 3, is the effect of a simple coincidence: Unisys must publish today its quarterly results and has planned a press conference, about them. , for tomorrow, August 4th. LeMagIT Excerpt from Alphv/BlackCat claim against Unisys. L’ironie n’échappera à personne : le site Web des solutions Stealth d’Unisys souligne que « les cybercriminels vous frappent là où ça fait mal ». Dans le cas présent, ce pourrait être « là où et quand ça fait mal ». La potentielle compromission de code source fermé rappelle d’autres cyberattaques, à l’instar de Solarwinds, mais également, dans le domaine simplement crapuleux, Exagrid, qui avait été attaqué par le groupe Conti. It was at the very beginning of December that the MalwareHunterTeam collective and Recorded Future discovered the BlackCat ransomware. The teams of the second noted advertisements for the recruitment of trustees on two forums regularly frequented by cybercriminals. AdvIntel believes that associates of the late Conti franchise are now working under the Alphv/BlackCat banner . TO DEEPEN ON THREATS, RANSOMWARE, DDOS * RANSOMWARE: A MONTH OF JULY IN CONTINUITY By: Valéry Rieß-Marchive * CUSTOMERS AND EMPLOYEES OF A BLACKCAT VICTIM WERE ABLE TO VERIFY IF THEY WERE CONCERNED By: Valéry Rieß-Marchive * RANSOMWARE: A MONTH OF MAY MARKED BY THE DECLINE OF THE THREAT ACROSS THE ATLANTIC By: Valéry Rieß-Marchive * AKKA TECHNOLOGIES WAS HIT WITH BLACKCAT RANSOMWARE By: Valéry Rieß-Marchive News * Ransomware: two mornings to better understand the threat and protect yourself against it * Servers: Lenovo unveils 11 configurations available in 50 versions * DBaaS: Aiven launches its managed version of the ClickHouse data warehouse * See all News Download Safety Information * In this number: * Why your business needs a SOC service * Faurecia puts its EDR in the front line against attackers * SIEM: Louis Dreyfus Company migrates to Microsoft Sentinel Download this edition Read also * Ransomware: a (deceptively?) quiet start to the year – LeMagIT * Ransomware: a month of April marked by several ... – LeMagIT * Cybercrime: what to expect from the conflict that... – LeMagIT * About * Charter of ethics and deontology * Meet the journalists * contacts * Use of Cookies * Reprints * Advertisers * Partners * Press kit * Diary * Our Journalists and Experts * Technologies * E-Handbooks * IT advice * opinions * Essential Guides * IT projects All rights reserved, Copyright 2007 - 2022 , TechTarget Privacy Cookies Settings Close ORIGINAL TEXT Contribute a better translation --------------------------------------------------------------------------------