French Aerospace Giant Hacked by Qilin Ransomware Group

By Thomas | Published on March 2, 2026

News

French aerospace giant LISI Group has fallen victim to a major cybersecurity breach, with the notorious Russian hacking group Qilin claiming responsibility. Known for its double extortion tactics, Qilin posted about the breach on their website, demanding a response from LISI Group as part of their typical extortion campaign. The company has yet to publicly comment.

About LISI Group & Qilin

LISI Group is a major industrial corporation primarily operating in the aerospace sector. Previously active in the medical and automotive industry, the company has since mainly pivoted toward aerospace manufacturing, producing critical fastening and assembly components used in both Boeing and Airbus aircraft. The company generates substantial revenue, exceeding $2 billion annually.

Qilin, by contrast, has a markedly different background. Reportedly based in Russia, the cybercriminal group first emerged in 2022 and has since accumulated a wide range of victims, including technology firms, manufacturers, energy conglomerates, and charitable organizations. The group is particularly known for its double extortion tactics, encrypting victims’ systems to demand ransom payments while simultaneously threatening to publish stolen data online if their demands are not met.

About the Breach

At this stage, limited information is available regarding how the breach occurred. It is also unclear exactly what data may have been exfiltrated; however, based on the information provided by Qilin, the compromised materials appear to consist primarily of corporate and financial documents rather than confidential patents or sensitive technological assets. The leaked data reportedly includes transaction records, financial documentation, and employee-related information.

On its website, the Qilin group claims that all stolen data will be published if LISI Group fails to make contact, consistent with its typical extortion strategy. The group has shared several samples of the allegedly stolen documents as proof of the breach, though no specific deadline for compliance has been provided. Beyond these details, little additional information is currently known.

Conclusion

This latest breach comes as little surprise in today’s landscape of increasingly brazen cybercrime, where even governments have become targets of extortion campaigns. Any vulnerability is liable to be exploited, making continuous system hardening and cybersecurity preparedness a critical priority, particularly for large corporations. As for Qilin, the incident reflects the group’s typical operating pattern; just days earlier, the group reportedly infiltrated Malaysian Airlines in a similar extortion campaign.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!