50 likes | 61 Views
Infiltration by the Maze malware is a two-way attack u2013 a data breach and a ransomware attack. Read how security testing can help you tackle with the malicious ransomware attack.
E N D
Introduction It can be unanimously and globally agreed upon that this has not been a good year. While the world is focused on a virus that has caused a health crisis, a computer virus is sneaking around and wreaking havoc into our socially-distanced lives. Digital technologies have played the central role in keeping things as normal as possible, allowing businesses to achieve continuity in their operations. However, several incidents have been reported where malicious elements hacked into the online systems and compromised the privacy, security, and integrity of the digital solutions. A ransomware attack early this year against the City of New Orleans government cost the city $7 million. As per a report, ransomware attacks are causing businesses more than $75 billion every year and it is expected that by 2021, it will cost $6 trillion annually as a new business will fall victim to a ransomware attack every 11 seconds. To the very least, these numbers are concerning and paint an ugly picture of the security status of organizations across the globe.
What is Maze Ransomware and why do we need to take it seriously? Like its predecessors, Maze too encrypts the victim’s files and asks for a ransom payment in exchange of restoring the data. However, what distinguishes Maze from the early variants is that it follows through on its threat of releasing the stolen data publicly. Earlier known as the ChaCha Ransomware, Maze claimed its first victim in May 2019 and is still on a rampant spree of attacking vulnerable businesses. The malware uses exploit kits, spam emails, and remote desktop connections with weak passwords to gain entry into a system. Once the malware is in, it laterally spreads across a corporate network and affects all the systems present in that network. It not only infects and encrypts the data but also steals the information by exfiltrating it to the servers controlled by the attackers. This means that an infiltration by the Maze malware is a two-way attack – a data breach and a ransomware attack.
Further, if the ransom is not paid, the attackers behind the Maze ransomware threaten to: • Release public details of the security breach and inform the media • Sell stolen information with commercial value on the dark market • Tell any stock exchanges on which the victim company might be listed about the hack and the loss of sensitive information • Use stolen information to attack clients and partners as well as inform them that the company was hacked. • Read Full Blog at: https://www.cigniti.com/blog/maze-ransomware-prevention-security-testing/