Categories: Cyber Security News

Accenture Hacked – Lockbit 2.0 Ransomware Compromised Thousands of Computers & Demand $50M

Exclusive!! One of the Worlds biggest IT Consulting firm Accenture reportedly hacked by the notorious Lockbit 2.0 Ransomware.

Accenture operating with more than 500k employees around the globe with a valuation of $44.3 billion and is the largest firm handling a wide range of development in various sectors such as banks, government, technology, energy, telecoms, and more.

LockBit is a cybercriminal gang roaming in the dark web that operates using a ransomware-as-a-service (RaaS) model—similar t REvil. The team behind the LockBit offers its ransomware platform for other entities or individuals to use based on an affiliate model and share the revenue collected from the victims.

Threat actors from the Lockbit Ransomware gang gain Accenture databases of over 6TB and demanding $50M in ransom.

Cybercrime intelligence firm Hudson Rock also reported that Accenture has 2,500 compromised computers of employees and partners, this information was certainly used by threat actors.

Researchers from Cyble mentioned in their report that the attacker gained internal system access through an “Insider”, a person who is already a part of the organization and working against the same organization for financial gain.

Actors threaten that the database will be leaked for the failed payment, also they have set a count down for the leak.

These data are allegedly stolen from Accenture at a recent cyber attack, and the actors are scheduled to leak the stolen data later today.

Insider Threat Helps

Threat actors alleged that the attack was initiated with the help of an insider threat who is still working in Accenture.

Also, the actors have mentioned on their site on the DarkWeb that “These people are beyond the security and privacy. I really hope that the services are better than what I saw as an insider. If you’re interested in buying some databases us, “All THE AVAILABLE DATA WILL BE PUBLISHED””

Threat actors are not released any of the sample data from the stolen database so far, but they claimes that they will sell the data if anyone is interested.

Risks of an insider threat, especially as technology becomes smarter and It can not only keep track of every employee who has access to the database, but it can also monitor each one automatically so that you can be alerted of potential dangers in real-time.

Also Read: 5 Steps How To Protect Your Company Infrastructure From Insider Threats

Accenture Response

Accenture confirmed this attack and responded that they are not ready to pay the ransom and affected systems had been recovered from a backup.

“Through our security controls and protocols, we identified irregular activity in one of our environments. We immediately contained the matter and isolated the affected servers.”

“We fully restored our affected systems from back-up. There was no impact on Accenture’s operations, or on our clients’ systems,” Accenture said.

Accenture said that the ransomware attack and already reached its vendor and also preparing to notify more customers.

It’s not yet disclosed that when the attack took place when it was detected and alerted, the technical issue for this exploitation.

GBHackers are continuously following up on this incident, and reached out to Accenture. we will update you further in detail once we obtained the further technical details.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…

1 hour ago

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…

2 hours ago

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…

3 hours ago

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000 malicious…

5 hours ago

Winos4.0 Malware Targets Windows Users Through Malicious PDF Files

A new wave of cyberattacks leveraging the Winos4.0 malware framework has targeted organizations in Taiwan…

5 hours ago

DeepSeek Data Leak Exposes 12,000 Hardcoded API Keys and Passwords

A sweeping analysis of the Common Crawl dataset—a cornerstone of training data for large language…

6 hours ago