Share on facebook
Share on google
Share on twitter
Share on linkedin
We offer Vulnerability Scanning, Penetration Testing, and Red Team Services to help uncover vulnerabilities.

Black hat hacker group, Maze, claims to have used ransomware to compromise the systems of insurance giant, Chubb. They also claim to have stolen the firm’s data.

Brett Callow, threat analyst at cybersecurity firm, Emsisoft, told Cointelegraph on March 27 that Maze published the claim on its website. While the website does not provide any direct proof of the hack so far, Callow pointed out facts that give the claim an air of credibility:

“Maze’s past victims include governments, law firms, healthcare providers, manufacturers, medical research companies, healthcare providers and more.”

Maze’s modus operandi

Callow explained that the group usually first claims the hacks after successful attacks and then — if the victim does not pay — they publish a small amount of the stolen data as proof of the hack. At this point, if the compromised entity still does not pay, Maze will start publishing more and more sensitive data:

Leave a Reply

About Us

Legacy Cyber Tech (LCT) is a risk management firm that specializes in Information Technology Auditing, Cyber Security Assessment, Regulatory Compliance Consulting, Asset management, Data Security and Privacy and practical Hands-on Cybersecurity Training. Legacy Cyber Tech provides Cyber Defense and Technology services to government, private, and independent organizations. 

Recent Posts

[Heads Up] Australian Government and businesses hit by massive cyber attack from ‘sophisticated, state-based actor’

Scott-Morrison reported that Australian Prime Minister Scott Morrison has announced that Australia is being hit with a massive cyber attack by a sophisticated foreign “state-based” hacker. 

“In an urgent press conference called this morning in Canberra, Mr Morrison said the ongoing, “large-scale” hack was being executed by a “sophisticated, state-based cyber actor”.

“This activity is targeting Australian organisations across a range of sectors, including all levels of government, industry, political organisations, education, health, essential service providers and operators of other critical infrastructure,” Mr Morrison told reporters.

“We know it is a sophisticated, state-based cyber actor because of the scale and nature of the targeting and the tradecraft used. Regrettably, this activity is not new. Frequency has been increasing.”

Follow Us

Weekly Tutorial

Sign up for our Newsletter

lets get Rolling