Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

IT Giant Accenture Hit by LockBit Ransomware; Hackers Threaten to Leak Data

accenture ransomware attackaccenture ransomware attack

Global IT consultancy giant Accenture has become the latest
company to be hit by the LockBit ransomware gang, according to a
post made by the operators on their dark web portal, likely filling
a void left in the wake of DarkSide and REvil shutdown.

“These people are beyond privacy and security. I really hope
that their services are better than what I saw as an insider,” read
a message posted on the data leak website. Accenture said[1]
it has since restored the affected systems from backups.

Stack Overflow Teams

LockBit, like its now-defunct DarkSide and REvil counterparts,
operates using a ransomware-as-a-service (RaaS) model, roping in
other cybercriminals (aka affiliates) to carry out the intrusion
using its platform, with the payments often divided between the
criminal entity directing the attack and the core developers of the
malware.

The ransomware group emerged on the threat landscape in
September 2019, and in June 2021 launched LockBit 2.0 along with an
advertising campaign to recruit new partners. “LockBit also claims
to offer the fastest data exfiltration on the market through
StealBit, a data theft tool that can allegedly download 100 GB of
data from compromised systems in under 20 minutes,” Emsisoft
noted[2]
in a profile of the crime syndicate.

Some of LockBit’s past victims include the Press Trust of India
and Merseyrail.

Enterprise Password Management

The development comes as ransomware[3]
incidents[4]
have become a critical threat to national and economic security
that have left businesses scrambling to pay hefty extortion
demands.

The spike in attacks against corporate and critical
infrastructure have also been increasingly accompanied by a tactic
called “triple extortion,” wherein sensitive data on a target’s
systems is extracted prior to locking up through encryption,
followed by applying pressure on victim companies into paying up by
threatening to publish the stolen data online, failing which, the
attackers then adopt a third phase, using that data to blackmail
its customers or launch DDoS attacks.

We have reached out to Accenture for further comment, and we
will update the story once we hear back.

References

  1. ^
    said
    (edition.cnn.com)
  2. ^
    noted
    (blog.emsisoft.com)
  3. ^
    ransomware
    (thehackernews.com)
  4. ^
    incidents
    (thehackernews.com)

Read more