In sparing the City of Pensacola, Florida, a Maze representative wrote: In the case of non-paying companies, Maze didn’t always dump their data online. Their “client fees” for exploiting the company’s cybersecurity weaknesses, however, amounted to millions of dollars in bitcoin and much financial gain for the ransomware group.Īside from the Maze News board, where companies’ data was released to the public, Maze kindly offered the Maze Support page, where “clients” could pay their “client fees” or chat to a member of the Maze team. In their press release, Maze referred to their victim companies as their “clients”. Maze lived by the mission that they existed to show the world the weaknesses of digital security and to warn individuals, companies, and countries that cybercriminals could cause significant damage without correction. MAZE THE “BENEVOLENT”: MISSION DRIVEN AND COVID CONSCIOUS Maze would coerce companies to pay millions in bitcoin to avoid exposure on the dark web, and this tactic has since been copied by other hacker/ransomware groups such as Sodinokibi, DoppelPaymer, and Nemty. Wait for their databases and private papers here. “Represented here companies do not wish to cooperate with us and trying to hide our successful attack on their resources. Their website boasted on its posting board, The “Maze News” site or “name and shame” game they created was unique. Maze was initially called “Chacha” within the security community as they used the popular Chacha cipher to encrypt the files and data that they stole. The encryption aspect of this is not too special- virtually all ransomware groups encrypt the files they steal and request a ransom for companies to recover those files. After extracting data, they would encrypt it and request a large sum of money in exchange for not publicly posting it on their website “Maze News”. They were notable for their successful impersonation of government agencies such as the “Italian Revenue Agency” and other false American and German authorities. Maze created a unique double extortion model where they would capture a target’s sensitive data using exploit kits, often in the form of spear-phishing emails to company employees. They were non-discriminatory in their victims and targeted a wide range of sectors in North America and Europe from the US’s largest cable and wire manufacturer (Southwire) to a Parisian hotel catering to Eiffel Tower visitors (Auteeuil Tour Eiifel). Maze ransomware group was first identified in May 2019 as a highly active team of operators in North America and Europe. MAZE THE “INNOVATOR”: A BRIEF HISTORY OF THE HACKER GROUP
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |