company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Ransomware

cyberthreat

loading..
loading..
loading..

LG Maze Ransomware

Maze Ransomware claims new victims, including the Giant LG Electronics

07-Jul-2020
2 min read

The ransomware community Maze continues to work hard to keep its name in news headlines. In addition to deliberately targeting many victims, it often frequently engages itself in marketing activities.

##New Victims:

The Maze operators have posted three screenshots of the stolen data for one of its victims, LG Electronics. One of the screenshots shows the source code file of LG 's products while the other two show the official LG Electronics firmware or software update.

Maze ransomware, on June 24, also posted information of new victims on its blog, calling the targeted organizations Xerox Corporation, WorldNet Telecommunications, Columbus Metro Federal Credit Union, and Webuild SpA (an Italian industrial group).

##Marketing ventures:

In addition to targeting its victims, it also did all manner of marketing campaigns, issuing pre-leak alerts (even before the sample data was leaked), and even providing a press release for its victims.

On 22 June Maze operators released a press release warning their victims not to attempt to open the locked files. They had stated at the end of that press release that they'll soon be leaking LG Electronics info.

The Maze group also gave details of the stolen data from four companies in one of the posts-ST engineering, MaxLinear, Conduent, and M.J. Brunner-who used a negotiator to recover the data they had stolen, but did not.

##What is the group up to?

It has targeted many high-profile government and defense agencies, contractors, engineering companies, electrical authority businesses, hardware manufacturers, financial organizations, and many more.

Obviously they are not searching for any particular target area or domain but they are trying to push their foot in whatever door they can.

Some of the organizations being targeted are in the US, while others are in South Korea, Japan, Canada, Latin America, and Brazil.