• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

Maze Ransomware Group Shuts Down But is the Threat Still Real?

Cyber Attacks

The Maze ransomware group, notorious for high profile data stealing, has announced it is closing its doors. The bizarre announcement (spelling mistakes included) made on their site using the dark web states “The Maze Team Project is announcing it is officially closed. All the links out to project, using of our brand, our work methods should be considered a scam”.

It goes on to say “The Maze Cartel was never exists and is not existing now. It can be found only inside the heads of the journalists who wrote about it”. But who were they and is this really the end?

Who are the Maze Ransomware Group?

The Maze ransomware group became known in 2019 after a series of high-profile attacks and threats to expose sensitive files from large organisations on the net. The Maze ransomware group were the first to blackmail users with threats to publish the victim’s data and information online, unless a ransom was paid.

Prior to this, ransomware groups would typically encrypt files with malware and then use ransom demands in order for the victim having to pay to get the files back. In this case the victim could either pay the money or risk losing the file and have to clear up the mess the cyber attacker caused.

The Maze ransomware group took this way of working a step further with the threat of publishing the sensitive and personal files online.

Organisations that have had documents published online include Canon, LG, Xerox, Southwire, Cognizant, Pensacola city government, the big pharmaceutical company ExecuPharm, Chubb cyber security, Tesla, Visser and many more.

This double layered tactic quickly became popular with other ransomware groups on the dark web, who again, used the threat of publishing files online to receive huge amounts of money from ransom. A wire manufacturer in Georgia was claimed to have been threatened to pay $6 million USD, even going up to $15 million USD for another unnamed organisation.

The Maze ransomware group’s earlier attacks consisted of exploit kits and various spam operations to take advantage of unsuspecting users. They then began to step up their game and specifically target high profile organisations, using virtual private networks (VPN) and remote desktop (RDP) servers to find vulnerabilities in big-brand companies. Failure to pay the ransom would end with large amounts of files being uploaded to the dark web, including personal information on employees and internal source codes.

man working on 2 laptops

Is the Maze Ransomware Group Really Shutting Down?

In their closing down statement, the Maze ransomware group says “Our world is shrinking in the recklessness and indifference, in laziness and stupidity. If you are taking the responsibility for other people money and personal data then try to keep it secure. Until you do that there will be more projects like Maze to remind you about secure data storage”. The group could indeed have made enough money for them to be able to shut down and close all operations, but as this statement suggests, ‘there will be more projects like Maze’.

The Maze group ran on an affiliate operation, meaning individual threat actors were able to cash in on a small percentage of the rewards. Maze affiliates are likely to simply move on to other ransomware groups, such as Egregor, thought to be a by-product of the Maze ransomware group.

This same group were emerging just as reports were starting to circulate around the closure of the Maze group- coincidence? Probably not. These ransomware criminals are likely to move on to better opportunities and the Maze group could potentially just be rebranding. There is no way to tell for sure. What we do know is that when one group shuts down, another one will open.

keyboard lit up in blue light

What New Threats are on the Rise?

With remote working becoming ever popular the risks of unsecure domains, weak passwords, more data sharing over the cloud, unprotected remote desktop protocol (RDP) and VPN’s, phishing attacks and malware threats are all on the rise.

Phishing attacks are becoming more sophisticated, fake COVID-19 related sites and scams are on the increase, networks are becoming less secure with people working from their kitchen tables and ransomware tactics are evolving.

The sophistication of such attacks is only ever going to increase, and cyber attackers will always be evolving their techniques. The time to update your security system is now.

At Cube Cyber we have a knowledgeable team of cyber experts to help you and your business. We have helped many organisations implement cost effective and advanced cyber security, to help stop these kinds of attacks.

For more information please get a quote with us today.

 

 

December 9, 2020/by Sam Topping
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
  • Share by Mail
https://cubecyber.com/wp-content/uploads/2020/12/cyber-security-hacker-in-clown-mask-2048x1365-1.jpg 1365 2048 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2020-12-09 03:57:592022-11-24 11:05:27Maze Ransomware Group Shuts Down But is the Threat Still Real?
You might also like
Types of Cyber Threat Actors and Their Motivations

Quick Search

Latest Insights

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

  • Cyber Security Australia: Increasing Attacks on BusinessesFebruary 12, 2021 - 3:21 am

    Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online. In the past, businesses only had to really worry about […]

  • Cyber Security Risk: What would it cost if your company could not work for one day?February 12, 2021 - 2:56 am

    Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation. Have you ever thought about what you could lose if your business were to go offline from a […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Tag Cloud

Cloud Computing Cyber Tips Data Breach emergency plan GDPR Hackers Malware News Office 365 Phishing Attacks Ransomware

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Phishing Attacks: What Exactly Are They?Which Industries Are Most Vulnerable to Cyber Attacks in 2021?
Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy