French tech company Atos troubles new gain warning, resulting in its shares to slump

  • Shares slump at open
  • Sees 2021 gross sales falling 2.4% to 10.8 bln euros
  • Operating margin found at 4%, underneath earlier 6% focus on
  • Warns of destructive free money movement
  • Atos CEO: to announce new approach plan in Q2

PARIS, Jan 10 (Reuters) – French technological innovation consulting firm Atos (ATOS.PA) issued a profit warning on Monday, its next in 7 months, causing its shares to slump to their lowest level considering the fact that all over mid-2012.

The company’s newest profit warning also came just many days just after its new CEO Rodolphe Belmer, appointed in Oct, officially took about the reins.

Atos shares plunged by 15% in early session investing.

Sign-up now for Cost-free limitless obtain to Reuters.com

Sign-up

Atos said its economical goals stated in July could not be achieved, because of equally to delays on discounts with customers and to decrease margins at its hardware and software resales unit.

“I joined the corporation very last week, at the time when the figures were being remaining gathered and consolidated. The latest condition of financial perception qualified prospects us to the obligation to difficulty a profit warning now because of to the significant variance in the money KPIs (key general performance indicators),” claimed Belmer.

“On the other hand, most of the things underlying this serious gap are non-recurring…I am convinced that the firm has the vital property and all the talents to function a swift turnaround”, he included.

The tenure of Atos’ preceding CEO, Elie Girard, was tainted by accounting problems and by a July 2021 earnings warning. study far more

The company’s slide from grace saw Atos exit France’s blue-chip CAC 40 (.FCHI) equity index and led to speculation about a takeover or the arrival of activist traders.

Atos stated it now envisioned a 2.4% decrease in its 2021 comprehensive 12 months revenues, coming in at 10.8 billion euros ($12.24 billion) – below a earlier forecast for “steady” sales.

Atos also now forecast an working margin at close to 4% for 2021 compared to a concentrate on of all over 6% previously, and its totally free dollars move concentrate on was now envisioned at a adverse figure of 420 million euros – below a past forecast for good cost-free income circulation.

Belmer, who previously led French satellite business Eutelsat (ETL.PA), claimed he will present a new organization of Atos’ board of directors at the stop of upcoming thirty day period, and a new approach plan in the second quarter of this calendar year.

Atos, whose shares had also slumped by all over 50% in 2021, will give its 2022 objectives on Feb 28.

($1 = .8827 euros)

Sign up now for Absolutely free endless access to Reuters.com

Sign-up

Reporting by Benoit Van Overstraeten
Enhancing by Christopher Cushing/Sudip Kar-Gupta

Our Expectations: The Thomson Reuters Rely on Principles.

Read More... Read More

FBI system hacked to email ‘urgent’ warning about fake cyberattacks

The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email impersonating FBI warnings that the recipients’ network was breached and data was stolen.

The emails pretended to warn about a “sophisticated chain attack” from an advanced threat actor known, who they identify as Vinny Troia. Troia is the head of security research of the dark web intelligence companies NightLion and Shadowbyte

The spam-tracking nonprofit SpamHaus noticed that tens of thousands of these messages were delivered in two waves early this morning. They believe this is just a small part of the campaign.

Legitimate address delivers fake content

Researchers at the Spamhaus Project, an international nonprofit that tracks spam and associated cyber threats (phishing, botnets, malware), observed two waves of this campaign, one at 5 AM (UTC) and a second one two hours later.

The messages came from a legitimate email address – [email protected] – which is from FBI’s Law Enforcement Enterprise Portal (LEEP), and carried the subject “Urgent: Threat actor in systems.”

All emails came from the FBI’s IP address 153.31.119.142 (mx-east-ic.fbi.gov), Spamhaus told us.

Fake cyber attack alert from legit FBI email address

The message warns that a threat actor has been detected in the recipients’ network and has stolen data from devices.

Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain attack. We tried to blackhole the transit nodes used by this advanced persistent threat actor, however there is a huge chance he will modify his attack with fastflux technologies, which he proxies trough multiple global accelerators. We identified the threat actor to be Vinny Troia, whom is believed to be affiliated with the extortion gang TheDarkOverlord, We highly recommend you to check your systems and IDS monitoring. Beware this threat actor is currently working under inspection of the NCCIC, as we are dependent on some of his intelligence research we can not interfere physically within 4 hours, which could be enough time to cause severe damage to your infrastructure.


Stay safe,

U.S. Department of Homeland Security | Cyber Threat Detection and Analysis | Network Analysis Group

Spamhaus Project told BleepingComputer that the fake emails reached at least 100,000 mailboxes. The number is a very conservative estimate, though, as the researchers believe “the campaign was potentially much, much larger.”

In a tweet today, the nonprofit said that the recipients were scraped from the American Registry for Internet Numbers (ARIN) database.

While this looks like a prank, there is no doubt that the emails originate from the FBI’s servers as the headers of the message show that its origin is verified by the DomainKeys Identified Mail (DKIM) mechanism.

Received: from mx-east-ic.fbi.gov ([153.31.119.142]:33505 helo=mx-east.fbi.gov)
envelope-from 
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  d=fbi.gov; s=cjis; t=1636779463; x=1668315463;
  h=date:from:to:message-id:subject:mime-version;
  bh=UlyBPHe3aElw3Vfnk/pqYLsBAoJGDFR1NyZFcSfpl5g=;
  b=N3YzXzJEbQCTJGh8qqjkYu/A5DTE7yoloPgO0r84N+Bm2ae6f+SxzsEq
   nbjnF2hC0WtiVIMMUVGzxWSiZjq1flEygQGI/JVjjk/tgVVPO5BcX4Os4
   vIeg2pT+r/TLTgq4XZDIfGXa0wLKRAi8+e/Qtcc0qYNuTINJDuVxkGNUD
   62DNKYw5uq/YHyxw+nl4XQwUNmQCcT5SIhebDEODaZq2oVHJeO5shrN42
   urRJ40Pt9EGcRuzNoimtUtDYfiz3Ddf6vkFF8YTBZr5pWDJ6v22oy4mNK
   F8HINSI9+7LPX/5Td1y7uErbGvgAya5MId02w9r/p3GsHJgSFalgIn+uY
   Q==;
   X-IronPort-AV: E=McAfee;i="6200,9189,10166"; a="4964109"
   X-IronPort-AV: E=Sophos;i="5.87,231,1631577600"; 
   d="scan'208";a="4964109"
Received: from dap00025.str0.eims.cjis ([10.67.35.50])
  by wvadc-dmz-pmo003-fbi.enet.cjis with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Nov 2021 04:57:41 
+0000
Received: from dap00040.str0.eims.cjis (dap00040.str0.eims.cjis [10.66.2.72])
	by dap00025.str0.eims.cjis (8.14.4/8.13.8) with ESMTP id 1AD4vf5M029322
	for ; Fri, 
Read More... Read More