According to ION Group, the company makes it possible for “financial institutions, central banks and enterprises to digitize and automate their most important business procedures”. Trading in financial derivatives on international markets has been affected as a result of a ransomware attack targeting Dublin-based software company ION Group. The attack on the financial software business by ransomware had an effect on “global markets”.
According to correspondence published by Bloomberg, the notorious LockBit gang, which is located in Russia, was the group responsible for the ransomware attack. Due to the incident, post-trade procedures, which are normally handled automatically by ION Group-developed software, have to be done by hand. This applies to a variety of tasks, some of which are extremely time sensitive and include the process of updating margin requirements for trades.
“The event is confined to a particular environment; All servers that were affected have been taken offline and the repair of the affected services is already underway.” According to the ION statement, more details will be provided “as they become available.”
The ability of ION Group clients to trade and settle exchange-traded derivatives is adversely affected as a result of network difficulties created by a cyber incident on selectION Group systems. ION Group is aware of these issues and is working to resolve them. To determine the degree of the effect on trading, processing and clearing, they are now collaborating with members who are affected by the situation, such as clearing firms and exchanges, as well as market regulators and other parties.
He is currently working to coordinate communication and information sharing through regular calls with relevant parties to assess businesses that have been impacted, how those businesses can collaborate to mitigate the disruption and seek clarity on concerns related to regulatory obligations and costs. affected reports.

He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He has also worked for security companies such as Kaspersky Lab. His daily work includes investigating new malware and cybersecurity incidents. He also has a deep level of knowledge in mobile security and mobile vulnerabilities.
Send news tips to [email protected] or www.instagram.com/iicsorg/
You can also find us on Telegram www.t.me/noticiasciberseguridad