Sunday, May 19, 2024

Cognizant Confirms Data Breach After Ransomware Attack

IT services giant cognizant suffered a ransomware attack last April which cause service disruptions to its clients.

Cognizant is one of the IT giants that has more than 300,000 employees and it provides IT services, including digital, technology, consulting, and operations services.

Files Stolen in Ransomware Attack

On April 17th the company stated that their internal systems hit by Maze ransomware. The company has informed its clients about the attack and “provided them with Indicators of Compromise (IOCs) and other technical information of a defensive nature”.

Cognizant published a breach notification letter states that the Maze ransomware operators are active with the Cognizant network between April 9 and 11.

The company initially learned that “the attackers staged and likely exfiltrated a limited amount of data from Cognizant’s systems.”

Now based on the company’s further investigation it was found that the majority of the personal information was exposed.

“The majority of the personal information that was impacted was information relating to our corporate credit cards.”

The company started informing all the associates who have an active corporate credit card and they are to offer credit and identity theft monitoring services.

The company also mentioned that they continue to monitor the account for any fraudulent activity and we have been informed that they have not seen an increase in fraud for our accounts.

The ransomware attacks now become an easy and malicious way of robbing individuals and company’s can cost billions of dollars not to mention the privacy and safety implications.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.


Latest articles

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that...

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices,...

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine,...

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers...

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information...

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated...

Millions Of IoT Devices Vulnerable To Attacks Leads To Full Takeover

Researchers discovered four significant vulnerabilities in the ThroughTek Kalay Platform, which powers 100 million...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles