Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Ultimate Guide to Node.js Development Pricing for Enterprises

      July 29, 2025

      Stack Overflow: Developers’ trust in AI outputs is worsening year over year

      July 29, 2025

      Web Components: Working With Shadow DOM

      July 28, 2025

      Google’s new Opal tool allows users to create mini AI apps with no coding required

      July 28, 2025

      5 preinstalled apps you should delete from your Samsung phone immediately

      July 30, 2025

      Ubuntu Linux lagging? Try my 10 go-to tricks to speed it up

      July 30, 2025

      How I survived a week with this $130 smartwatch instead of my Garmin and Galaxy Ultra

      July 30, 2025

      YouTube is using AI to verify your age now – and if it’s wrong, that’s on you to fix

      July 30, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025
      Recent

      Time-Controlled Data Processing with Laravel LazyCollection Methods

      July 30, 2025

      Create Apple Wallet Passes in Laravel

      July 30, 2025

      The Laravel Idea Plugin is Now FREE for PhpStorm Users

      July 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025
      Recent

      New data shows Xbox is utterly dominating PlayStation’s storefront — accounting for 60% of the Q2 top 10 game sales spots

      July 30, 2025

      Opera throws Microsoft to Brazil’s watchdogs for promoting Edge as your default browser — “Microsoft thwarts‬‭ browser‬‭ competition‬‭‬‭ at‬‭ every‬‭ turn”

      July 30, 2025

      Activision once again draws the ire of players for new Diablo Immortal marketing that appears to have been made with generative AI

      July 30, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Telecom Giant Orange Responding to Cyberattack on ‘Information Systems’

    Telecom Giant Orange Responding to Cyberattack on ‘Information Systems’

    July 29, 2025

    Orange, Orange Cyberattack, ANSSI, Cyberattack

    French telecom giant Orange issued red alert as it responds to a cyberattack targeting its “information systems.” Certain services and platforms, of both corporate and regular consumers, facing disruptions due to ongoing response.

    Orange first detected the cyberattack on Friday, July 25, when its security team saw intrusion on one of its information systems.

    The telecom provider dialled in its Orange Cyberdefense team who sprung in action “to isolate the potentially affected services and limit the impacts,” Orange said in a press statement.

    “However, these isolation operations have resulted in the disruption of certain services and management platforms for some of our corporate customers and some consumer services, primarily in France,” it added.

    The company ensured that it had already identified the issues and were working on solutions that under “heightened vigilance” will allow a gradual restoration of the important services by Wednesday morning, July 30.

    Also read: Orange Recovers from Cyberattack, Restoring Internet to Spanish Customers

    Orange telecom has a strong presence across Europe, Africa and the Middle East. In fact, in MEA, every three out of 10 people are Orange customers. It serves more than 291 million customers worldwide and the breach has definitely got them worried. But to calm the nerves Orange stated: “At this stage of the investigation, there is no evidence to suggest that any customer or Orange data has been extracted. We remain vigilant in this regard.”

    The telecom giant did not respond any further requests that would ascertain the exact type of cyberattack. It said, “For obvious security reasons, Orange will not comment further.

    The Orange cyberattack is not an isolated incident. The French telecommunications industry has been a primary target for adversaries in the past two years, revealed a recently published report from the Computer Emergency Response Team of France that operates under the French cybersecurity agency, ANSSI.

    Espionage has been the main reason for these attacks and ANSSI stated it has already dealt with significant compromises of information system operators in this sector for this purpose. Pointing to the Salt Typhoon’s attacks on the U.S. telecom sector, the French cybersecurity agency said, “The telecommunications sector as a whole is regularly and significantly targeted by groups of attackers believed to be linked to China, particularly in Asia.

    Also read: Salt Typhoon Cyberattack: FBI Investigates PRC-linked Breach of US Telecoms

    It also revealed that in one particular instance, the state-sponsored attackers compromised the core mobile network of an unnamed telecommunications provider in the country. “The main characteristics of the modus operandi observed during this compromise were a good knowledge of the communication protocols specific to the sector and a focus on equipment that is unconventional or rarely supervised by security solutions.”

    In another instance, an operator’s satellite communication infrastructure was deeply compromised for several years, enabling the attacker heightened privileges to conduct sabotage actions. Another telecommunications operator received ANSSI’s assistance in removing a malicious actor present in its systems since at least December 2022. This attacker, known for targeting the sector again achieved high-level privileges, enabling lateral movement, espionage, and sabotage. Interception of specific communications was confirmed to be a key objective of this threat actor.

    ANSSI noted that in most cases the cyberattacks were detected years after initial compromise. It anticipates continued targeting of this infrastructure type and urged the telecommunications sector to heighten its vigilance.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleFBI, CISA Warn About Scattered Spider Cyberattacks
    Next Article Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44

    Related Posts

    Development

    Time-Controlled Data Processing with Laravel LazyCollection Methods

    July 30, 2025
    Development

    Create Apple Wallet Passes in Laravel

    July 30, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    FBI: Play ransomware breached 900 victims, including critical orgs

    Security

    Using Pages CMS for Static Site Content Management

    News & Updates

    CVE-2025-48292 – GoodLayers Tourmaster PHP Remote File Inclusion Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-5690 – PostgreSQL Anonymizer Mask Data Read Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    News & Updates

    I’m surprised Helldivers 2 has a new Warbond already, and it’s adding a stratagem I’ve wanted for ages — here’s everything in it

    June 5, 2025

    Helldivers 2 is already getting another new Warbond called Force of Law, with most of…

    Strapi:Unleash the Power to Build Modern,Highly Customizable Websites with the Ultimate Headless CMS

    April 30, 2025

    Embracing the Present: Finding Joy in Your UX Journey

    June 6, 2025

    CVE-2025-45472 – Apache Autodeploy Privilege Escalation Vulnerability

    May 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.