Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Orange Hit by Cyberattack – A French Telecom Giant’s Internal Systems Hacked

Posted on July 29, 2025July 29, 2025 By CWS

France’s main telecommunications big Orange confirmed on Monday that it detected a major cyberattack focusing on one in all its info techniques on Friday, July 25, 2025.

The incident has resulted in widespread service disruptions affecting each company prospects and shopper companies, primarily inside France.

The assault prompted quick motion from Orange’s safety groups, working in collaboration with Orange Cyberdefense, the corporate’s specialised cybersecurity division.

Groups had been shortly mobilized to isolate doubtlessly affected companies and restrict the affect of the breach, although these protecting measures themselves have triggered extra service interruptions.

Service Disruptions and Buyer Affect

The cyberattack has led to vital disruptions of sure administration companies and platforms for Orange’s enterprise prospects, together with some shopper companies all through France. The corporate’s devoted assist groups have been totally deployed to tell and help affected prospects throughout the ongoing incident.

Orange, which serves greater than 290 million prospects globally and operates as one in all Europe’s largest cellular service suppliers, acknowledged that the isolation procedures essential to include the assault have sadly resulted in collateral service disruptions.

The telecommunications operator, ranked because the fourth-largest cellular operator in Europe, has emphasised its dedication to transparency whereas working to revive regular operations.

Orange’s technical groups have recognized options that can allow the gradual restoration of the principle impacted companies underneath heightened safety vigilance.

The corporate has introduced that it expects to reopen the first affected companies by Wednesday morning, July 30, marking practically every week of disrupted operations because the preliminary assault.

The operator has filed a proper grievance with authorities and is working carefully with regulation enforcement companies all through the investigation course of.

On the present stage of the investigation, Orange has acknowledged that there isn’t any proof suggesting that buyer knowledge or inside Orange info has been extracted from the compromised techniques.

The timing of this assault comes shortly after Orange Cyberdefense strengthened its European presence, including 40 extra cybersecurity specialists to its staff.

This incident provides to a regarding sample of cyberattacks focusing on main telecommunications suppliers globally. The French telecommunications sector has confronted elevated scrutiny from cybersecurity companies, with France’s ANSSI warning about state-sponsored threats focusing on the nation’s telecommunications infrastructure for espionage functions.

Orange’s earlier cybersecurity incidents, together with knowledge breaches affecting its Romanian operations earlier in 2025, reveal the persistent menace panorama going through main telecommunications operators.

The corporate continues to work with related authorities and maintains its dedication to defending buyer knowledge and restoring full service capabilities as shortly and safely as attainable.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:Cyberattack, French, Giants, Hacked, Hit, Internal, Orange, Systems, Telecom

Post navigation

Previous Post: Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets
Next Post: Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44

Related Posts

Threat Actors Abuse AI Website Creation App to Deliver Malware Cyber Security News
New Linux Malware With Weaponized RAR Archive Deploys VShell Backdoor Cyber Security News
Microsoft Released an Emergency Security Update to Patch a Critical SharePoint 0-Day Vulnerability Cyber Security News
New FrigidStealer Malware Attacking macOS Users to Steal Login Credentials Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
  • Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Advertising Anivia Stealer Malware on Dark Web Bypassing UAC Controls
  • Threat Actors Merging FileFix and Cache Smuggling Attacks to Evade Security Controls
  • New TEE.Fail Side-Channel Attack Extracts Secrets from Intel and AMD DDR5 Secure Enclaves
  • New GhostGrab Android Malware Silently Steals Banking Login Details and Intercept SMS for OTPs
  • Stragglers From Myanmar Scam Center Raided by Army Cross Into Thailand as Buildings are Blown Up

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News