IT Giant Accenture Hit by LockBit Ransomware; Hackers Threaten to Leak Data

News

Global IT consultancy giant Accenture has become the latest company to be hit by the LockBit ransomware gang, according to a post made by the operators on their dark web portal, likely filling a void left in the wake of DarkSide and REvil shutdown.

“These people are beyond privacy and security. I really hope that their services are better than what I saw as an insider,” read a message posted on the data leak website. Accenture said it has since restored the affected systems from backups.

Stack Overflow Teams

LockBit, like its now-defunct DarkSide and REvil counterparts, operates using a ransomware-as-a-service (RaaS) model, roping in other cybercriminals (aka affiliates) to carry out the intrusion using its platform, with the payments often divided between the criminal entity directing the attack and the core developers of the malware.

The ransomware group emerged on the threat landscape in September 2019, and in June 2021 launched LockBit 2.0 along with an advertising campaign to recruit new partners. “LockBit also claims to offer the fastest data exfiltration on the market through StealBit, a data theft tool that can allegedly download 100 GB of data from compromised systems in under 20 minutes,” Emsisoft noted in a profile of the crime syndicate.

Some of LockBit’s past victims include the Press Trust of India and Merseyrail.

Prevent Ransomware Attacks

The development comes as ransomware incidents have become a critical threat to national and economic security that have left businesses scrambling to pay hefty extortion demands.

The spike in attacks against corporate and critical infrastructure have also been increasingly accompanied by a tactic called “triple extortion,” wherein sensitive data on a target’s systems is extracted prior to locking up through encryption, followed by applying pressure on victim companies into paying up by threatening to publish the stolen data online, failing which, the attackers then adopt a third phase, using that data to blackmail its customers or launch DDoS attacks.

We have reached out to Accenture for further comment, and we will update the story once we hear back.

Products You May Like

Articles You May Like

10 Most Impactful PAM Use Cases for Enhancing Organizational Security
Warning: DEEPDATA Malware Exploiting Unpatched Fortinet Flaw to Steal VPN Credentials
Palo Alto Networks Confirms New Zero-Day Being Exploited by Threat Actors
The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
watchTowr Finds New Zero-Day Vulnerability in Fortinet Products

Leave a Reply

Your email address will not be published. Required fields are marked *