SlideShare ist ein Scribd-Unternehmen logo
1 von 5
www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 1
Tackling the maze ransomware attack with security testing
www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 2
Introduction
It can be unanimously and globally agreed upon that this has not been a good year. While the world is focused
on a virus that has caused a health crisis, a computer virus is sneaking around and wreaking havoc
into our socially-distanced lives.
Digital technologies have played the central role in keeping things as normal as possible, allowing businesses to
achieve continuity in their operations. However, several incidents have been reported where malicious
elements hacked into the online systems and compromised the privacy, security, and integrity of the digital
solutions.
A ransomware attack early this year against the City of New Orleans government cost the city $7 million. As per
a report, ransomware attacks are causing businesses more than $75 billion every year and it is expected that by
2021, it will cost $6 trillion annually as a new business will fall victim to a ransomware attack every 11 seconds.
To the very least, these numbers are concerning and paint an ugly picture of the security status of organizations
across the globe.
www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 3
What is Maze Ransomware and why do we need to take it seriously?
Like its predecessors, Maze too encrypts the victim’s files and asks for a ransom payment in exchange of
restoring the data. However, what distinguishes Maze from the early variants is that it follows through on its
threat of releasing the stolen data publicly. Earlier known as the ChaCha Ransomware, Maze claimed its first
victim in May 2019 and is still on a rampant spree of attacking vulnerable businesses. The malware uses
exploit kits, spam emails, and remote desktop connections with weak passwords to gain entry into a system.
Once the malware is in, it laterally spreads across a corporate network and affects all the systems present in
that network. It not only infects and encrypts the data but also steals the information by exfiltrating it to the
servers controlled by the attackers. This means that an infiltration by the Maze malware is a two-way attack –
a data breach and a ransomware attack.
www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 4
Further, if the ransom is not paid, the attackers behind the Maze ransomware threaten to:
• Release public details of the security breach and inform the media
• Sell stolen information with commercial value on the dark market
• Tell any stock exchanges on which the victim company might be listed about the hack and the loss of sensitive
information
• Use stolen information to attack clients and partners as well as inform them that the company was hacked.
Read Full Blog at: https://www.cigniti.com/blog/maze-ransomware-prevention-security-testing/
www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 5

Weitere ähnliche Inhalte

Was ist angesagt?

Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021 Roen Branham
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?Samvel Gevorgyan
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...Symantec
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeJeferson Propheta
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014- Mark - Fullbright
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016Nathan CAVRIL
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021Starttech Ventures
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...Paul Wright MSc
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Symantec
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security ReportHackerOne
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015Bev Robb
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 

Was ist angesagt? (20)

Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?What is the Cybersecurity plan for tomorrow?
What is the Cybersecurity plan for tomorrow?
 
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response ConferenceLindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
Lindsey Nelson, 2nd Cyber Insurance & Incident Response Conference
 
Sophos Security Threat Report 2014
Sophos Security Threat Report 2014Sophos Security Threat Report 2014
Sophos Security Threat Report 2014
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021David Derigiotis, Cyber Insurance & Incident Response Conference 2021
David Derigiotis, Cyber Insurance & Incident Response Conference 2021
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
Internet Security Threat Report 2014 :: Volume 19 Appendices - The hardcore n...
 
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
118 Hacker-Powered Facts From The 2018 Hacker-Powered Security Report
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 

Ähnlich wie Tackling the Maze Ransomware Attack with Security Testing

The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsProtected Harbor
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdfHiYeti1
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?MaryJWilliams2
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal ArticleTaylre Janak
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfkirtigoyal328
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 

Ähnlich wie Tackling the Maze Ransomware Attack with Security Testing (20)

The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Cyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdfCyber security olive green mint ppt .pdf
Cyber security olive green mint ppt .pdf
 
Cybercrime: Radically Rethinking the Global Threat
Cybercrime:  Radically Rethinking the Global ThreatCybercrime:  Radically Rethinking the Global Threat
Cybercrime: Radically Rethinking the Global Threat
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 

Mehr von Cigniti Technologies Ltd

Cloud Migration Assurance – COTS Migration Challenges.pptx
Cloud Migration Assurance – COTS Migration Challenges.pptxCloud Migration Assurance – COTS Migration Challenges.pptx
Cloud Migration Assurance – COTS Migration Challenges.pptxCigniti Technologies Ltd
 
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxHow Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxCigniti Technologies Ltd
 
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptx
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptxDay-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptx
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptxCigniti Technologies Ltd
 
An Insight into Oracle Fusion Patching and Testing Readiness.pptx
An Insight into Oracle Fusion Patching and Testing Readiness.pptxAn Insight into Oracle Fusion Patching and Testing Readiness.pptx
An Insight into Oracle Fusion Patching and Testing Readiness.pptxCigniti Technologies Ltd
 
Challenger Banks Business Drivers and Success Imperatives.pptx
Challenger Banks Business Drivers and Success Imperatives.pptxChallenger Banks Business Drivers and Success Imperatives.pptx
Challenger Banks Business Drivers and Success Imperatives.pptxCigniti Technologies Ltd
 
Accelerating Digital Transformation Through the Cloud.pptx
Accelerating Digital Transformation Through the Cloud.pptxAccelerating Digital Transformation Through the Cloud.pptx
Accelerating Digital Transformation Through the Cloud.pptxCigniti Technologies Ltd
 
Hyper personalization a key enabler in the digital evolution of banks
Hyper personalization a key enabler in the digital evolution of banksHyper personalization a key enabler in the digital evolution of banks
Hyper personalization a key enabler in the digital evolution of banksCigniti Technologies Ltd
 
Cloud migration assurance for digital payment applications
Cloud migration assurance for digital payment applicationsCloud migration assurance for digital payment applications
Cloud migration assurance for digital payment applicationsCigniti Technologies Ltd
 
Healthcare technological advancements in evidence based medicine
Healthcare technological advancements in evidence based medicineHealthcare technological advancements in evidence based medicine
Healthcare technological advancements in evidence based medicineCigniti Technologies Ltd
 
Succeeding at digital transformation in today’s world
Succeeding at digital transformation in today’s worldSucceeding at digital transformation in today’s world
Succeeding at digital transformation in today’s worldCigniti Technologies Ltd
 
Shift left your focus to migrating your digital offerings
Shift left your focus to migrating your digital offeringsShift left your focus to migrating your digital offerings
Shift left your focus to migrating your digital offeringsCigniti Technologies Ltd
 
Augment human testers first in the path to ai based autonomous testing
Augment human testers first in the path to ai based autonomous testingAugment human testers first in the path to ai based autonomous testing
Augment human testers first in the path to ai based autonomous testingCigniti Technologies Ltd
 
Shift-left Testing for Continuous Delivery of Quality and Value at Speed
Shift-left Testing for Continuous Delivery of Quality and Value at SpeedShift-left Testing for Continuous Delivery of Quality and Value at Speed
Shift-left Testing for Continuous Delivery of Quality and Value at SpeedCigniti Technologies Ltd
 
7 reasons why you need a testing center of excellence
7 reasons why you need a testing center of excellence7 reasons why you need a testing center of excellence
7 reasons why you need a testing center of excellenceCigniti Technologies Ltd
 
Web services test automation framework, challenges & benefits
Web services test automation framework, challenges & benefitsWeb services test automation framework, challenges & benefits
Web services test automation framework, challenges & benefitsCigniti Technologies Ltd
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your WebsiteCigniti Technologies Ltd
 
How Testing FinTech Supports Catering to the Baby Boomers
   How Testing FinTech Supports Catering to the Baby Boomers   How Testing FinTech Supports Catering to the Baby Boomers
How Testing FinTech Supports Catering to the Baby BoomersCigniti Technologies Ltd
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions Cigniti Technologies Ltd
 

Mehr von Cigniti Technologies Ltd (20)

Cloud Migration Assurance – COTS Migration Challenges.pptx
Cloud Migration Assurance – COTS Migration Challenges.pptxCloud Migration Assurance – COTS Migration Challenges.pptx
Cloud Migration Assurance – COTS Migration Challenges.pptx
 
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptxHow Blockchain is Solving the Pain Points in the Payments Sector.pptx
How Blockchain is Solving the Pain Points in the Payments Sector.pptx
 
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptx
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptxDay-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptx
Day-In-The-Life DITL Testing Why is it important for Enterprise Customers.pptx
 
An Insight into Oracle Fusion Patching and Testing Readiness.pptx
An Insight into Oracle Fusion Patching and Testing Readiness.pptxAn Insight into Oracle Fusion Patching and Testing Readiness.pptx
An Insight into Oracle Fusion Patching and Testing Readiness.pptx
 
Challenger Banks Business Drivers and Success Imperatives.pptx
Challenger Banks Business Drivers and Success Imperatives.pptxChallenger Banks Business Drivers and Success Imperatives.pptx
Challenger Banks Business Drivers and Success Imperatives.pptx
 
Accelerating Digital Transformation Through the Cloud.pptx
Accelerating Digital Transformation Through the Cloud.pptxAccelerating Digital Transformation Through the Cloud.pptx
Accelerating Digital Transformation Through the Cloud.pptx
 
Hyper personalization a key enabler in the digital evolution of banks
Hyper personalization a key enabler in the digital evolution of banksHyper personalization a key enabler in the digital evolution of banks
Hyper personalization a key enabler in the digital evolution of banks
 
Cloud migration assurance for digital payment applications
Cloud migration assurance for digital payment applicationsCloud migration assurance for digital payment applications
Cloud migration assurance for digital payment applications
 
Healthcare technological advancements in evidence based medicine
Healthcare technological advancements in evidence based medicineHealthcare technological advancements in evidence based medicine
Healthcare technological advancements in evidence based medicine
 
Succeeding at digital transformation in today’s world
Succeeding at digital transformation in today’s worldSucceeding at digital transformation in today’s world
Succeeding at digital transformation in today’s world
 
Shift left your focus to migrating your digital offerings
Shift left your focus to migrating your digital offeringsShift left your focus to migrating your digital offerings
Shift left your focus to migrating your digital offerings
 
Augment human testers first in the path to ai based autonomous testing
Augment human testers first in the path to ai based autonomous testingAugment human testers first in the path to ai based autonomous testing
Augment human testers first in the path to ai based autonomous testing
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
DevOps trends to look out for in 2022
DevOps trends to look out for in 2022DevOps trends to look out for in 2022
DevOps trends to look out for in 2022
 
Shift-left Testing for Continuous Delivery of Quality and Value at Speed
Shift-left Testing for Continuous Delivery of Quality and Value at SpeedShift-left Testing for Continuous Delivery of Quality and Value at Speed
Shift-left Testing for Continuous Delivery of Quality and Value at Speed
 
7 reasons why you need a testing center of excellence
7 reasons why you need a testing center of excellence7 reasons why you need a testing center of excellence
7 reasons why you need a testing center of excellence
 
Web services test automation framework, challenges & benefits
Web services test automation framework, challenges & benefitsWeb services test automation framework, challenges & benefits
Web services test automation framework, challenges & benefits
 
10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website10 Open Source Security Testing Tools to Test Your Website
10 Open Source Security Testing Tools to Test Your Website
 
How Testing FinTech Supports Catering to the Baby Boomers
   How Testing FinTech Supports Catering to the Baby Boomers   How Testing FinTech Supports Catering to the Baby Boomers
How Testing FinTech Supports Catering to the Baby Boomers
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions
 

Kürzlich hochgeladen

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesVictoriaMetrics
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxRTS corp
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 

Kürzlich hochgeladen (20)

Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
What’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 UpdatesWhat’s New in VictoriaMetrics: Q1 2024 Updates
What’s New in VictoriaMetrics: Q1 2024 Updates
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptxThe Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
The Role of IoT and Sensor Technology in Cargo Cloud Solutions.pptx
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 

Tackling the Maze Ransomware Attack with Security Testing

  • 1. www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 1 Tackling the maze ransomware attack with security testing
  • 2. www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 2 Introduction It can be unanimously and globally agreed upon that this has not been a good year. While the world is focused on a virus that has caused a health crisis, a computer virus is sneaking around and wreaking havoc into our socially-distanced lives. Digital technologies have played the central role in keeping things as normal as possible, allowing businesses to achieve continuity in their operations. However, several incidents have been reported where malicious elements hacked into the online systems and compromised the privacy, security, and integrity of the digital solutions. A ransomware attack early this year against the City of New Orleans government cost the city $7 million. As per a report, ransomware attacks are causing businesses more than $75 billion every year and it is expected that by 2021, it will cost $6 trillion annually as a new business will fall victim to a ransomware attack every 11 seconds. To the very least, these numbers are concerning and paint an ugly picture of the security status of organizations across the globe.
  • 3. www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 3 What is Maze Ransomware and why do we need to take it seriously? Like its predecessors, Maze too encrypts the victim’s files and asks for a ransom payment in exchange of restoring the data. However, what distinguishes Maze from the early variants is that it follows through on its threat of releasing the stolen data publicly. Earlier known as the ChaCha Ransomware, Maze claimed its first victim in May 2019 and is still on a rampant spree of attacking vulnerable businesses. The malware uses exploit kits, spam emails, and remote desktop connections with weak passwords to gain entry into a system. Once the malware is in, it laterally spreads across a corporate network and affects all the systems present in that network. It not only infects and encrypts the data but also steals the information by exfiltrating it to the servers controlled by the attackers. This means that an infiltration by the Maze malware is a two-way attack – a data breach and a ransomware attack.
  • 4. www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 4 Further, if the ransom is not paid, the attackers behind the Maze ransomware threaten to: • Release public details of the security breach and inform the media • Sell stolen information with commercial value on the dark market • Tell any stock exchanges on which the victim company might be listed about the hack and the loss of sensitive information • Use stolen information to attack clients and partners as well as inform them that the company was hacked. Read Full Blog at: https://www.cigniti.com/blog/maze-ransomware-prevention-security-testing/
  • 5. www.cigniti.com | Unsolicited Distribution is Restricted. Copyright © 2017 - 18, Cigniti Technologies 5