FBI issuing repeated warnings
In early January this year, the FBI released increased warnings about Maze ransomware attacks. As a ploy to steal data, cybercriminals are pretending to be government agencies or security vendors. And they've been extorting victims beyond ransomware demands.
The Maze hacker group has been active and gaining attention since in November 2019. They began using the extortion tactic of threatening US organizations with publicizing their stolen data as a way of forcing victims to pay their ransom. At the end of last year, the hackers notified sites like DataBreaches.net that they had victims’ stolen data and they were holding it with plans to publish it later if ransoms weren’t paid.
One such Maze victim, a cable and wire manufacturer company in Georgia called Southwire, would not pay the $1.7M ransom demand. When the hackers published their stolen data on a website named something close to “mazenews,” Southwire filed an emergency injunction to force the hackers to remove the information and prevent them from releasing additional data. A judge issued the order which did force the website to be taken down within 24 hours. However, the Maze hackers simply registered two new domains outside US jurisdiction in Singapore and China and within days, resumed publishing Southwire’s stolen data under those new site domains. That data remains published and the hackers have continued with data releases since.
The Maze hacking group is continuing to deploy its ransomware and is publically naming the organizations it claims to have hacked if they’ve refused to pay the demanded ransom. They’ve threatened to expose private information from three law firms in South Dakota if their demands weren’t met.
Ransomware attacks against the medical community have been on the rise and the Maze attackers have struck medical providers across the US. How many attempts have been made and how many have been successful overall isn’t known because not all of them are disclosed. But increasing numbers of healthcare breaches have been made public in the last year.
In one example of a Maze ransomware attack, the bad actors encrypted 231 workstations at Medical Diagnostic Lab in New Jersey. The hackers first demanded over $800K in ransom from the lab to unencrypt the stolen data and they demanded a second payment of the same amount to delete the data. When MD Lab didn’t cave to the extortion, the thieves published close to 10GB of stolen PHI.
Brett Callow, threat analyst from Emsisoft, stated that healthcare organizations among the published victims include Stockdale Radiology and Sunset Radiology. Data from a chiropractor in South Dakota is also likely among the stolen and published data of Maze victims.
Past incidents like these have caused delays in service and disruptions, creating possible threats to patient’s health and certainly to patient privacy when their protected health information is exposed. It’s not inconceivable that the hackers could attempt to extort even the patients the data belongs to.
On Maze’s unorthodox websites like DataBreaches.net, close to 30 companies are named as having their data stolen but not having paid up on the ransom bill. Samples of their allegedly stolen data are viewable. Good options are scarce. If a company pays the ransom, who’s willing to trust the thieves can be trusted not to renew the extortion at a later date?
Emsisoft’s Brett Callow says, “Organizations that have data stolen have no good options available to them. Threat actors will promise to destroy data if ransoms are paid - but why would a criminal enterprise destroy data that it may be able to further monetize? The answer is that they probably will not.”
Organizations should also realized they cannot rely on backups as a means of protection against enterprise ransomware. While still important for restoring data, backups won’t stop hackers from stealing or revealing data. And in some cases, such as Ryuk, the malware corrupts backups as well. (See our article The Year of Rising Ransomware, Ryuk Wields its Own Unique Nastiness.)
Most conventional security tools are not equipped to defend against these types of sophisticated attacks. But that doesn’t leave companies without options.
What Can Businesses Do to Protect Themselves from Maze?
Virsec takes a unique approach to guard-railing your applications and countering a broad spectrum of cyber attacks, including ransomware attacks.
Only Virsec Security Platform Delivers:
Don’t leave your organization’s future to chance. Learn more about Virsec now.
Further resources
Solution Brief: Ransomware Protection
Virsec’s Message-Security Guy TV Episode 1486, RSA 2020 Pre-Show Interview with Willy Leichter
The Year of Rising Ransomware, Ryuk Wields its Own Unique Nastiness
MegaCortex Ransomware Worsens — Hackers Change Users’ Passwords & Make Blackmail Demands
MegaCortex Malware Strikes Business Networks, Does Damage Both as Ransomware and Disk Wiper
Sources:
https://healthitsecurity.com/news/fbi-alerts-to-rise-in-maze-ransomware-extortion-attempts
https://www.cyberscoop.com/maze-ransomware-law-firms-fbi/