Thursday, December 7, 2023

IT Services Giant Cognizant Hit by Maze Ransomware Cyber Attack

Cognizant Technology Solutions Corp, one of the largest IT services providers hit by Maze Ransomware Cyber Attack which causes service disruptions to its clients.

The company has more than 300,000 employees and it provides IT services, including digital, technology, consulting, and operations services.

Maze Ransomware Attack – Cognizant

The company started emailing their client on Friday, stating that their internal systems hit by Maze ransomware attack.

“Cognizant can confirm that a security incident involving our internal systems, and causing service disruptions for some of our clients, is the result of a Maze ransomware attack,” reads the company statement.

The company said that they have implemented internal security associated with leading cyber defense firms and “taking steps to contain this incident”.

They also engaged with the law enforcement authorities, according to the statement posted to its website on Saturday.

https://twitter.com/underthebreach/status/1251605359409664005

The company has informed their “clients and have provided them with Indicators of Compromise (IOCs) and other technical information of a defensive nature”.

The maze ransomware was first observed in May 2019, operators behind the maze ransomware are known for stealing unencrypted files before encrypting them.

Then by using the stolen files, the operators will threaten the victims to pay the ransom or they will release the data.

Unlike other ransomware operators who use social engineering and spam email campaigns to attack targeted systems, the maze ransomware operators use exploit kits to place the foothold.

“If the Maze operators conducted this attack, they were likely present in Cognizant’s network for weeks, if not longer,” who first reported the incident.

Once the encryption completed each file gets appended with different extension along with the original extension and the desktop wallpaper get’s changed to below.

Maze ransomware developed by skilled developers, they include a number of stealthy mechanisms and it poses a big threat to individuals and enterprises.

The ransomware attacks now become an easy and malicious way of robbing individuals and company’s can cost billions of dollars not to mention the privacy and safety implications.

Website

Latest articles

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Hackers Deliver AsyncRAT Through Weaponized WSF Script Files

The AsyncRAT malware, which was previously distributed through files with the .chm extension, is now being...

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles