
"Maze ransomware was discovered on May 29, 2019. The Maze authors created a fake Abra cryptocurrency site in order to buy traffic from ad networks. Visitors to the cryptocurrency site would then be redirected to the exploit kit landing page under certain conditions. Using RSA and ChaCha20 encryption as part of the process, the ransomware scans for files to encrypt and appends different extensions to the files" as per Bleepingcomputer reports.
Being a ransomware, Maze initially spreads across a corporate network of the target & infects computers it finds and encrypts data so it cannot be accessed. The fundamental operation of this ransomware is it steals the data it finds and ex-filtrates it to servers controlled by malicious hackers who then threaten to release it on the internet if a ransom is not paid.
The Maze ransomware is hard programmed with some tricks to prevent reversing of it and to make static analysis more difficult, according to McAfee Labs.
In addition to all of this they also have a website they list their targets. The website includes details of when victims had their computer systems hit by the Maze ransomware as well as links to downloads of stolen data and documents as “proof.” There are even convenient buttons on the website to share details of breaches via social media.
Related Article
Outline & Research Your Ebook / Choose Your Topic:
Digireload TeamChoose a topic that interests you & your audience. It could belong to any category there's no confinement to selecting topics, but it shoul...
Moratorium On Term Loans
Digireload TeamAll lending institutions have been permitted a three-month moratorium on payments of instalments of all term loans outstanding as of March 1, 2020....
Customer Loyalty
Digireload TeamDid you know that it can cost up to 5 times more to acquire a new customer than retaining an existing one? Or that the success rate of sellin...