1 / 5

Tackling the Maze Ransomware Attack with Security Testing

Infiltration by the Maze malware is a two-way attack u2013 a data breach and a ransomware attack. Read how security testing can help you tackle with the malicious ransomware attack.

olivermoore
Download Presentation

Tackling the Maze Ransomware Attack with Security Testing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tackling the maze ransomware attack with security testing

  2. Introduction It can be unanimously and globally agreed upon that this has not been a good year. While the world is focused on a virus that has caused a health crisis, a computer virus is sneaking around and wreaking havoc into our socially-distanced lives.   Digital technologies have played the central role in keeping things as normal as possible, allowing businesses to achieve continuity in their operations. However, several incidents have been reported where malicious elements hacked into the online systems and compromised the privacy, security, and integrity of the digital solutions.   A ransomware attack early this year against the City of New Orleans government cost the city $7 million. As per a report, ransomware attacks are causing businesses more than $75 billion every year and it is expected that by 2021, it will cost $6 trillion annually as a new business will fall victim to a ransomware attack every 11 seconds. To the very least, these numbers are concerning and paint an ugly picture of the security status of organizations across the globe. 

  3. What is Maze Ransomware and why do we need to take it seriously? Like its predecessors, Maze too encrypts the victim’s files and asks for a ransom payment in exchange of restoring the data. However, what distinguishes Maze from the early variants is that it follows through on its threat of releasing the stolen data publicly. Earlier known as the ChaCha Ransomware, Maze claimed its first victim in May 2019 and is still on a rampant spree of attacking vulnerable businesses. The malware uses exploit kits, spam emails, and remote desktop connections with weak passwords to gain entry into a system. Once the malware is in, it laterally spreads across a corporate network and affects all the systems present in that network. It not only infects and encrypts the data but also steals the information by exfiltrating it to the servers controlled by the attackers. This means that an infiltration by the Maze malware is a two-way attack – a data breach and a ransomware attack.

  4. Further, if the ransom is not paid, the attackers behind the Maze ransomware threaten to:  • Release public details of the security breach and inform the media  • Sell stolen information with commercial value on the dark market  • Tell any stock exchanges on which the victim company might be listed about the hack and the loss of sensitive information  • Use stolen information to attack clients and partners as well as inform them that the company was hacked.  • Read Full Blog at: https://www.cigniti.com/blog/maze-ransomware-prevention-security-testing/

More Related