Maze ransomware targets numerous high-profile organizations

VT San Antonio Aerospace and Westech International among Maze ransomware’s victims

Maze ransomware is at it again. The infamous threat has recently been observed targeting the systems of US aerospace services provider VT San Antonio Aerospace (VT SAA).

VT SAA recently disclosed that it suffered Maze ransomware attack, resulting in the exposure of sensitive company data, including contract details with various governments, government-related organizations and airlines.

Advertisement - Article continues below

In all, hackers stole 1.5 TB of data. To accomplish such a feat, hackers accessed a compromised Administrator account via a remote desktop connection and attacked the company's domain controllers, intranet servers and file servers on two domains.

General Manager of VT SAA Ed Onwe spoke with Bleeping Computer about the Maze ransomware attack, explaining VT SAA “discovered that a sophisticated group of cyber criminals, known as the Maze group, gained unauthorized access to our network and deployed a ransomware attack.” 

“Upon discovering the incident, the Company took immediate action, including disconnecting certain systems from the network, retaining leading third-party forensic advisors to help investigate and notifying appropriate law enforcement authorities,” Onwe added.

The first week of June saw many disclosures from other high-profile organizations targeted by Maze ransomware too. Westech International, a US military nuclear missile contractor, recently announced being hit with a Maze ransomware attack.

Advertisement
Advertisement - Article continues below

After gaining unauthorized access to Westech International's internal network, hackers encrypted the company's machines and pressured the company into paying a fee by leaking confidential company documents online. 

Other companies impacted by Maze ransomware attacks this month include the ST Engineering Group, Conduent, TekCollect & AmerAssist, the Smith Group, Kerr Controls, and others.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats
ethical hacking

Mobile banking apps are exposing user data to attackers

26 Jun 2020
Visit/security/malware/356231/most-malware-came-through-https-connections-in-q1-2020
malware

Most malware came through HTTPS connections in Q1 2020

25 Jun 2020
Visit/security/phishing/356211/phishing-attacks-target-unsuspecting-wells-fargo-customers
phishing

Phishing attacks target unsuspecting Wells Fargo customers

24 Jun 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/hardware/components/356405/is-it-time-to-put-intel-outside
components

Is it time to put Intel Outside?

10 Jul 2020