Ransomware Threatens To Publish Data Of Victims Who Did Not Pay The Ransom

✨ Megiddo

✨ President ✨
Staff member
May 15, 2016
Maze malware developers have created a website that lists the latest victims.


Maze ransomware operators have created a website that lists the latest victims who decided to rebuild their computer systems on their own without paying a ransom.

“The companies represented here do not want to cooperate with us and are trying to hide our successful attack on their resources. Wait for their databases and personal documents here. Follow the news! ”, The ransomware website reported.

According to journalist Brian Krebs, at least one of the companies listed on the site has really recently sufferedfrom the Maze attack, which has not yet been reported in the media. Criminals have already published data on Maze victims, including information on the date of the first infection, stolen Microsoft Office documents, text and PDF files, and information on the total files allegedly stolen from the victims (in gigabytes), as well as the IP addresses and names of infected servers .

Ransomware operators for many years threatened victims to publish stolen data on the Web, but they never actually carried out their threats. It seems that the situation changed after Maze operators published 700 MB of data on the information security company Allied Universal, which refused to pay the ransom.

Notably, Microsoft recently recommendedrefrain from paying ransom, since in most cases it is too expensive, dangerous and only encourages extortionists to continue their activities. In addition, according to the company, the decryption key received from the ransomware does not guarantee that the data will be restored. As a measure to protect against ransomware, the tech giant advises users to use effective email filtering solutions, regularly fix vulnerabilities in hardware and software systems, use modern anti-virus software, separate administrative and privileged credentials from regular user accounts, and implement the “white list” practice applications and regularly back up critical systems and files.
Top Bottom