Maze ransomware targets numerous high-profile organizations

VT San Antonio Aerospace and Westech International among Maze ransomware’s victims

Maze ransomware is at it again. The infamous threat has recently been observed targeting the systems of US aerospace services provider VT San Antonio Aerospace (VT SAA).

VT SAA recently disclosed that it suffered Maze ransomware attack, resulting in the exposure of sensitive company data, including contract details with various governments, government-related organizations and airlines.

In all, hackers stole 1.5 TB of data. To accomplish such a feat, hackers accessed a compromised Administrator account via a remote desktop connection and attacked the company's domain controllers, intranet servers and file servers on two domains.

General Manager of VT SAA Ed Onwe spoke with Bleeping Computer about the Maze ransomware attack, explaining VT SAA “discovered that a sophisticated group of cyber criminals, known as the Maze group, gained unauthorized access to our network and deployed a ransomware attack.” 

“Upon discovering the incident, the Company took immediate action, including disconnecting certain systems from the network, retaining leading third-party forensic advisors to help investigate and notifying appropriate law enforcement authorities,” Onwe added.

The first week of June saw many disclosures from other high-profile organizations targeted by Maze ransomware too. Westech International, a US military nuclear missile contractor, recently announced being hit with a Maze ransomware attack.

After gaining unauthorized access to Westech International's internal network, hackers encrypted the company's machines and pressured the company into paying a fee by leaking confidential company documents online. 

Other companies impacted by Maze ransomware attacks this month include the ST Engineering Group, Conduent, TekCollect & AmerAssist, the Smith Group, Kerr Controls, and others.

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

22 Jan 2021
Global ransom DDoS extortionists are retargeting companies
distributed denial of service (DDOS)

Global ransom DDoS extortionists are retargeting companies

22 Jan 2021
BEC scammers are using Google Forms to identify easy victims
phishing

BEC scammers are using Google Forms to identify easy victims

21 Jan 2021
FBI warns of ongoing corporate vishing attacks
phishing

FBI warns of ongoing corporate vishing attacks

19 Jan 2021

Most Popular

School laptops sent by government arrive loaded with malware
malware

School laptops sent by government arrive loaded with malware

21 Jan 2021
SolarWinds hackers hit Malwarebytes through Microsoft exploit
hacking

SolarWinds hackers hit Malwarebytes through Microsoft exploit

20 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021