More

    Maze ransomware gang leaked the stolen files of Canon USA Security Affairs

     

    Maze ransomware operators have leaked on-line the unencrypted information allegedly stolen from Canon throughout a latest ransomware assault.

    In line with an inside memo obtained by ZDNet final week, the latest outage suffered by Canon was attributable to a ransomware assault, on the identical time Maze ransomware operators have been taking the credit score for the incident.

    The memo additionally reveals that the corporate has employed an exterior safety agency to research the incident.

    The issue was first reported by Bleepingcomputer, which tracked a suspicious outage on Canon’s picture.canon cloud photograph and video storage service. In line with the media outlet, the incident resulted within the lack of information for customers of their free 10GB storage characteristic.

    The picture.canon website suffered an outage on July 30th, 2020, that lasted for six days, till August 4th.

    On the time the corporate solely confirmed an inside investigation on an issue associated to “10GB of knowledge storage.”

    Canon incident noticeSupply BleepingComputer

    In line with Canon, a few of the photograph and picture information saved previous to June 16 have been “misplaced,” however it identified that they weren’t uncovered in an information leak.

    Now the Maze ransomware operators have revealed unencrypted information allegedly stolen the Canon in the course of the ransomware assault.

    BleepingComputer obtained from its supply a portion of the ransom observe and an inside notification that Canon despatched to its staff.

    canon internal-noticeCanon inside discover – Supply BleepingComputer

    BleepingComputer has obtained extra unpublished inside paperwork despatched by the Canon IT division on August 10th to the workers in regards to the restoration of companies.

    “We’re solely sharing a portion of the e-mail under, as we don’t wish to reveal the corporate’s inside techniques.” reads the put up from BleepingComputer.

    Maze ransomware operators have began to publish information stolen from the corporate on its information leak website.The gang has revealed a 2.2 GB archive known as “STRATEGICPLANNINGpart62.zip” that attackers declare comprise round 5% of the whole quantity of paperwork stolen in the course of the assault,

    The archive incorporates information associated to Canon’s web site and advertising supplies, in keeping with BleepingComputer’s supply it do not seem to comprise any monetary info, worker info, or different delicate information.

    Maze ransomware operators not too long ago revealed inside information from LG and Xerox after the corporate didn’t pay the ransom.

    As normal, the Maze ransomware operators threaten the victims to pay the ransom to keep away from their information being leaked on-line.

    Maze ransomware operators have additionally breached the techniques of the Xerox Company and stolen information earlier than encrypting them.

    Previously months Maze Ransomware gang breached the US chipmaker MaxLinear and Threadstone Advisors LLP, a US company advisory agency specialising in mergers ‘n’ acquisitions.

    Maze operators have been very lively in the course of the previous months, they’ve additionally stolen information from US navy contractor Westech and the ST Engineering group, and so they have launched bank card information stolen from the Financial institution of Costa Rica (BCR) threatening to leak different tons each week.

    Earlier victims of the ransomware gang embody IT companies corporations Cognizant and Conduent.

    Pierluigi Paganini

    (SecurityAffairs – hacking, Maze ransomware operators)

     


     

    Recent Articles

    Inflammatory skin diseases

    INFLAMMATORY SKIN DISEASES AND THEIR TREATMENT The most common and important inflammatory skin diseases include neurodermatitis, psoriasis, acne and rosacea. We are also aware of many...

    Unravel the XDR Noise and Recognize a Proactive Approach

      Cybersecurity professionals know this drill nicely all too nicely. Making sense of heaps of info and noise to entry what actually issues. XDR (Prolonged Detection & Response) has been a technical acronym thrown round within the cybersecurity business with many notations and...

    PLATYPUS: Hackers Can Obtain Crypto Keys by Monitoring CPU Power Consumption

      Researchers have disclosed the small print of a brand new side-channel assault technique that can be utilized to acquire delicate data from a system...

    The Container configurations in Amazon ECS

      Revealed: November 7, 2020 | Modified: November 7, 2020 | Zero views A fast put up on superior container configurations in Amazon ECS. ECS container superior...

    Antivirus Testing – VIPRE for your Home and Business

      Individuals typically marvel, “What’s one of the best antivirus?” A number of distributors will declare that their product is one of the best within...

    Related Stories