Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the development of our societies, by placing people at the heart of decision-making.
Early this month, the French defence and technology group confirmed to be aware that the ransomware group LockBit 3.0 claimed to have stolen some of its data.
Thales was added to the list of victims of the Lockbit 3.0 group on October 31, the gang threatened to publish stolen data by November 7, 2022, if the company would have not paid the ransom by the deadline.
The deadline was reached and the ransomware gang maintained its promise and carried out its threats.

The Cloud Consultancy provision, setup and manage SME Cyber Security services to protect your business. Whatever your business, however big or small it is, you will receive phishing attacks at some point. Think about how you will help your staff understand the threat and how to spot phishing. As with other advice, give them the tools to defend against it in their personal lives and they will bring that behaviour back to work. There are other important steps which mitigate the impact when the phishing succeeds. You will never stop it all. DO NOT BLAME staff when they get it wrong – they are only human.
On Friday, the group started publishing confidential data stolen from the company. Thales downplayed the incident and explained that the security breach will have no impact on its activities.
This is the second time this year that the Thales was the victim of a cyber attack orchestrated by the Lockbit gang. The first attack took place in January and at the time the company also refused to pay the ransom. At the time, the gang leaked hundreds of Zip archives, the most recent dated January 1, 2022. The leaked files included internal code.
“These 1,320 files were no longer available for download on Tuesday morning. ” reported the French newspaper Le Parisien. “Contacted by Le Parisien, the Thales group acknowledged the exfiltration of data and specified that “most of the stolen files which appear to have been copied from a code repository server (“code repository”), hosting data with a low level of sensitivity and which is external to the group’s main information systems.””
Source: SecurityAffairs