Maze Ransomware Attack: All You Need to Know in 2022

Maze Ransomware Attack: All You Need to Know in 2022

In recent years ransomware1 has become a constant threat to numerous enterprises and individuals. Some ransomware variants even developed into the whole business model — RaaS. This particular malware grows largely thanks to the whole business steadily moving online and a large portion of employees working remotely. In this article, we will look at what Maze ransomware is, how it works and how to deal with it.

The new variants of malware2 are being developed and some of those already existing are getting regular updates. The ransomware operators constantly make the news by targeting enterprises, even threatening the national security of countries.

What is Maze Ransomware?

A sophisticated strain of Windows ransomware that was initially developed as a variant of ChaCha ransomware. First time cyber security specialists discovered it in May 2019. The malware targets organizations worldwide across numerous industries.

NOTE: Ransomware – one of the most dangerous types of malware. Knowing how to protect your system from attack is important no matter who you are.

The same as with other forms of ransomware it demands money for the restoration of encrypted data. If the victim of an attack refuses to pay they threaten to leak the beforehand stolen data. The general behavior of the malware is similar to JSWorm/Nemty/Nefilim, Clop, REvil/Sodinokibi and others.

Maze Ransomware Algorithms

First time the Maze cybercriminals conducted an attack in May 2019. Initially criminals distributed it via exploit kits and spam email but now they have developed new and more stealthy procedures, techniques and tactics. Sometimes they even hire other threat actors to conduct a research of their new victim. >

The malicious emails Maze ransomware actors sent with the  “Your AT&T wireless bill is ready to view” and “Missed package delivery” titels in the subject line. 

Once threat actors will find a security gap in the network they try to obtain an elevated privilege, then conduct lateral movement to finally deploy file encryption across all drives; all this before carefully stealing data. 

How Does Maze Ransomware Work?

For the encryption Maze ransomware uses RSA and ChaCha20 algorithms. After the encryption is done the malware changes the desktop image to the ransom note.

With the notice displayed the victim now has the option to decide whether to pay the ransom or not. Usually the Maze cybercriminals will ask for $500 in Bitcoins to pay via specified BTC wallet address. The ransom gets doubled unless the payment is not made in time. 

Maze Ransomware

Protect Against Maze Ransomware

How to Protect Against Maze Ransomware

Alas there’s no decryption tool available for the Maze ransomware strain so the only solution will be following some security measures to at least prevent the likelihood of getting infected with this malware:

  1. Keep your software and OS regularly updated. It’s a common security rule not only against ransomware but also against any cybersecurity threat present out there in the world. Cybercriminals will have less chance to succeed if there’s less vulnerabilities to exploit. 
  2. Set the management of your accounts. Here comes setting complex passwords, changing them frequently, enabling multi factor authentication mechanisms. Generally you should avoid browsing or opening documents if you are logged in as administrator. 
  3. Keep Microsoft Office macros disabled. These little programs that do useful tasks should not be enabled once you open the Excel or Word document. Remember that Maze ransomware particularly exploited the thing making it its modus operandi back in a day. 
  4. Browse with caution. Try to develop a secure browsing habit. Regularly update your browser, don’t install suspicious extensions, set a setting to block any pop up ads. Check if the website you’re visiting is secure by looking at its address bar in a browser. It should be HTTPS to guarantee you the safety and security of your doings on the website. On the contrary, the connection with just  HTTP doesn’t offer enough of that. 
  5. Make the back up of your files. It can be an online or offline backup but it definitely should be in place. Using it you protect your valuable data not only from some ransomware attack but also other cyber attacks of different kinds. In addition, don’t forget to protect the backup itself with strong, complex passwords.
  6. Don’t forget about email security. Never open attachments or go after links that came from unknown, unexpected or unwanted sources. Enable multi-factor authentication and set the passwords’ expiration date. Just be extra cautious with all the correspondence you receive.
  7. Keep your antivirus solution regularly updated. In case the infection is there in your system your antivirus solution will be able to effectively detect it and remove it. 

Examples of Maze Ransomware Attacks

In a ransom note a victim also receives detailed instructions on how to make payment. In addition cybercriminals offer proof of them having the decryption keys/tools; victims can send them for the free decryption up to three files to get the proof. The most famous victims on Maze ransomware list are:

The LG Electronics Attack

In a case with this company the gang didn’t execute the encryption on the compromised network but instead they chose to only steal the sensitive data. The reason for such a peculiar move was explained by the gang themselves to the ZDNet reporters when the journalists contacted them on their leak site. 

INTERESTIONG FACT: Some examples of ransomware may threaten victims to delete your files or publish some of your sensitive data unless you pay a ransom.

We decided not to execute [the] Maze [ransomware] because their clients are socially significant and we do not want to create disruption for their operations, so we only have exfiltrated the data,” the gang responded to the reporters. In the attack hackers stole 50.2 GB from LG’s internal network and published it online. 

The Cognizant Attack

Cognizant, a one of the largest IT services provider and company from Fortune 500 firm list suffered the Maze attack in April 2020. The attack resulted in widespread service outages. 

Both the internal and external work of the company got paralyzed when the employees and sales teams lost communications. Due to the attack the IT provider suffered significant financial losses. It was estimated that losses made up from $50 to $70 million in lost revenue.

The Xerox Attack

In July 2021 the giant printing company also suffered an attack from the Maze ransomware. The gang stole more than 100 GB from Xerox. Among the stolen data were various databases and financial documents and as specialists noted it seems that the encryption process started on June 24.

The Allied Universal Attack

In November 2019 a security staffing firm suffered an attack from Maze ransomware as well. The gang leaked about 700 MB  of data after the company surpassed the deadline for ransom payment. As usual in such cases the criminals warned that they leaked only ten percent of what was actually stolen. 

Other Similar Ransomware Attacks

You can say it’s true that the ransomware has become number one in the Evil Corporation these days because the next malware variants has also made the name by hitting the big fish:

1) Locker Ransomware

Recently the FBI issued an alert that the gang has infected at least 52 critical infrastructure organizations across America. The systems that have been attacked include those in information technology sectors, government, financial services, energy and critical manufacturing.

2) Avaddon Ransomware

The infamous avaddon ransomware gang used not the double but triple extortion techniques threatening it’s victims with DDoS attacks until the ransom is paid. The group doesn’t operate anymore, at least not under this name after the attack on Australian-based telecom provider Schepisi Communication.

3) VoidCrypt Ransomware

VoidCrypt ransomware hard to get rid of it unless there’s direct involvement of the criminals behind it. IT means you can restore your encrypted files without them but unfortunately there’s less chance you will restore with the criminals help you only suffer financial and data loss.

IMPORTANT: The Help virus belongs to the VoidCrypt ransomware family and encrypts all data on your PC. A scientifically accurate name for the help would be “VoidCrypt family ransomware type infection”.

4) Snatch Ransomware

Let’s talk Snatch ransomware attack. In one organization’s network the gang managed to infect 200 machines, or roughly 5% of the company’s computers. Another target on the gang’s list was Volvo Cars. Even though the Snatch team took the responsibility for the attack the company had not confirmed their involvement. In addition the group has also harassed for a long time the employees of the Canadian airport posting little by little the stolen info. 

Conclusion

But how fierce the ransomware can be, you can also find a good antivirus software product that can help you with protection and security. Try Gridinsoft Anti-Malware to stand against any future cyber threats. It offers an easy to navigate interface and efficient work.

  1. Ransomware
  2. What is Malware?

Leave a Reply

Your email address will not be published.