Canon apparently didn’t pay up as previously believed after it fell victim to a Maze ransomware attack, because the company’s stolen data has cropped up online.
On the site where Maze leaks data from its conquests, attackers said that they would release five percent of the data stolen from Canon during the late July attack, according to a BleepingComputer report, and a 2.2 GB file labeled STRATEGICPLANNINGpart62.zip has indeed been published.
“Evidence suggests that [Maze] operates under an affiliate model, which explains the diversity in its targets as well as the heterogeneity in TTPs employed to successfully compromise its victims,” said Andrea Carcano, co-founder of Nozomi Networks. “While originally spread through exploit kits and emails with malicious attachments, it has evolved to follow new trends and recently began to be deployed post-compromise. The post-compromise deployment approach gives the attackers time to perform lateral movement in the network and maximize the potential impact by exfiltrating and encrypting specific assets.”
Maze has proliferated in the little more than a year it has been around. “It’s quite unique in the way the operation is managed, its scale, and the sheer number of organizations that have become its victims,” said Carcano.
Its operators have become increasingly willing to make good on their promises to publish stolen data if their demands aren’t met, leaving companies like Canon to decide whether to pay up.