{"id":2358,"date":"2020-04-19T16:40:18","date_gmt":"2020-04-19T16:40:18","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=2276"},"modified":"2022-12-02T15:14:49","modified_gmt":"2022-12-02T09:44:49","slug":"organizations-hit-by-maze-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/","title":{"rendered":"Organizations Hit by Maze Ransomware Attack !!"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Maze - Varutra Consulting\"><\/p>\n<h3><strong>Introduction to Maze Ransomware &#8211;<\/strong><\/h3>\n<p>Maze ransomware is also known as <strong>ChaCha<\/strong>, is a ransomware that had been first discovered in the month of <strong>May 2019<\/strong>. Maze ransomware attack is a sophisticated attack and is deemed to be an multi staged cyber attack.<\/p>\n<p>The major goal of this ransomware attack is to encrypt all files present on the targeted system belonging to the victim&#8217;s organization and later demand ransom to recover the files.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Exploitation Techniques &#8211;<\/strong><\/h3>\n<p>Unlike rest of the ransomware attacks that typically uses social engineering and spam email campaigns to gain entry to a targeted system,\u00a0Maze ransomware attack uses exploit kits via drive-by downloads.<\/p>\n<p><em>An exploit kit or exploit pack is a type of toolkit cyber criminals use to attack vulnerabilities in systems so they can distribute malware or perform further malicious activities.<\/em><\/p>\n<p><strong>Fallout<\/strong> is one of the exploit-kits used by Maze ransomware, that uses various exploits found on GitHub. Exploit kits\u00a0use PowerShell commands instead of the web browser to run its payload.<\/p>\n<p>Maze ransomware has been involved in spam emails sent by the Maze attack group by impersonating government websites. These attackers have emailed malicious Microsoft Word attachments to victims with macros embedded which if executed, executes a PowerShell script that downloads &#8220;<strong>Cobalt Strike<\/strong>&#8221; which is a penetration testing tool that has been repurposed by the attackers.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Attack in Action &#8211;<\/strong><\/h3>\n<p>Maze ransomware attack key generation and file encryption process is depicted below &#8211;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2278\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-Process.jpg.png\" alt=\"Bitdefender - A Technical Look into Maze Ransomware Attack\" width=\"588\" height=\"427\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Bitdefender &#8211; A Technical Look into Maze Ransomware<\/em><\/p>\n<p>Post the malware finishes encrypting the files, it changes the desktop wallpaper to the image as shown below \u2013<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2279\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-Desktop.jpg\" alt=\"\" width=\"878\" height=\"471\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: McAfee.com Blogs &#8211; Maze Ransomware<\/em><\/p>\n<p>Recently,\u00a0one of the largest tech giant and consulting company, has confirmed that it was hit by a Maze ransomware attack. The security incident involved breach to the organization\u2019s internal systems which caused service disruptions for some of their clients.<\/p>\n<p>The attackers gained administrator credentials on the internal corporate network; they then deployed the ransomware using tools like PowerShell Empire. Before deploying the ransomware, the Maze operators had stolen unencrypted files before encrypting them.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Recommendations To Avoid <em>Maze Ransomware <\/em>\u2013<\/strong><\/h3>\n<ol>\n<li>Network administrators are advised to block the IOC&#8217;s as mentioned in the &#8220;IOC\u2019s&#8221; section of this blog.<\/li>\n<li>Network administrators should consider disabling PowerShell execution or reduce the capabilities by using AppLocker or Windows Software Restriction Policy (SRP) (as applicable).<\/li>\n<li>Organizations should educate employees in the organization to not to download any files from suspicious sources or click on suspicious links.<\/li>\n<li>Organizations should keep and maintain a reliable and tested backup of data which can be restored in case of an emergency.<\/li>\n<li>Security administrators should ensure encryption of sensitive files and data on all servers and systems.<\/li>\n<li>Employees and users should exercise caution while visiting unknown links or webpages.<\/li>\n<li>Keep AV signatures as well as the operating system and 3rd party application patches up-to-date.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><strong>Indicators of Compromise (IOC&#8217;s) [22nd April 2020] \u2013<\/strong><\/h3>\n<p><strong>Hash Values (SHA256) \u2013<\/strong><br \/>\n04e22ab46a8d5dc5fea6c41ea6fdc913b793a4e33df8f0bc1868b72b180c0e6e<br \/>\n067f1b8f1e0b2bfe286f5169e17834e8cf7f4266b8d97f28ea78995dc81b0e7b<br \/>\n1161b030293e58d15b6a6a814a61a6432cf2c98ce9d156986157b432f3ebcf78<br \/>\n153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57<br \/>\n195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9<br \/>\n30b72e83d66cbe9e724c8e2b21179aecd4bcf68b2ec7895616807df380afab54<br \/>\n33afa2f1d53d5279b6fc87ce6834193fdd7e16e4b44e895aae4b9da00be0c502<br \/>\n4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d<br \/>\n4218214f32f946a02b7a7bebe3059af3dd87bcd130c0469aeb21b58299e2ef9a<br \/>\n5603a16cbf81d183d3ff4ffea5477af1a4be01321865f0978c0e128051ec0a82<br \/>\n58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806<br \/>\n5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353<br \/>\n6878f7bd90434ac5a76ac2208a5198ce1a60ae20e8505fc110bd8e42b3657d13<br \/>\n6a22220c0fe5f578da11ce22945b63d93172b75452996defdc2ff48756bde6af<br \/>\n822a264191230f753546407a823c6993e1a83a83a75fa36071a874318893afb8<br \/>\n83f8ce81f71d6f0b1ddc6b4f3add7a5deef8367a29f59b564c9539d6653d1279<br \/>\n877c439da147bab8e2c32f03814e3973c22cbcd112d35bc2735b803ac9113da1<br \/>\n91514e6be3f581a77daa79e2a4905dcbdf6bdcc32ee0f713599a94d453a26fc1<br \/>\n9751ae55b105ad8ffe6fc5dc7aea60ad723b6df67a959aa2ea6f4fa640d20a71<br \/>\n9845f553ae868cd3f8d8c3f8684d18f226de005ee6b52ad88b353228b788cf73<br \/>\n9ad15385f04a6d8dd58b4390e32d876070e339eee6b8da586852d7467514d1b1<br \/>\n9be70b7fe15cd64aed5b1adc88c2d5270bce534d167c4a42d143ae0059c3da1c<br \/>\nb30bb0f35a904f67d3ac0082c59770836cc415dc5b7225be04e8d7c79bde73be<br \/>\nc040defb9c90074b489857f328d3e0040ac0ddab26cde132f17cccae7f1309cc<br \/>\nc11b964916457579a268a36e825857866680baf1830cd6e2d26d4e1e24dec91b<br \/>\nc84b2c7ec20dd835ece13d5ae42b30e02a9e67cc13c831ae81d85b49518387b9<br \/>\nea19736c8e89e871974aabdc0d52ad0f0948159d4cf41d2889f49448cbe5e705<br \/>\necd04ebbb3df053ce4efa2b73912fd4d086d1720f9b410235ee9c1e529ea52a2<br \/>\nF491fb72f106e879021b0bb1149c4678fb380c255d2ef11ac4e0897378793f49<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Indicators of Compromise (IOC&#8217;s) [19th April 2020] \u2013<\/strong><\/p>\n<p><strong>IP Addresses \u2013<\/strong><br \/>\n91[.]218[.]114[.]11<br \/>\n91[.]218[.]114[.]25<br \/>\n91[.]218[.]114[.]26<br \/>\n91[.]218[.]114[.]31<br \/>\n91[.]218[.]114[.]32<br \/>\n91[.]218[.]114[.]37<br \/>\n91[.]218[.]114[.]38<br \/>\n91[.]218[.]114[.]4<br \/>\n91[.]218[.]114[.]77<br \/>\n91[.]218[.]114[.]79<br \/>\n92[.]63[.]11[.]151<br \/>\n92[.]63[.]32[.]2<br \/>\n92[.]63[.]15[.]56<br \/>\n92[.]63[.]17[.]245<br \/>\n92[.]63[.]194[.]20<br \/>\n92[.]63[.]29[.]137<br \/>\n92[.]63[.]32[.]57<br \/>\n92[.]63[.]15[.]8<br \/>\n92[.]63[.]32[.]55<br \/>\n92[.]63[.]32[.]52<br \/>\n92[.]63[.]194[.]3<br \/>\n92[.]63[.]15[.]6<br \/>\n92[.]63[.]8[.]47<br \/>\n92[.]63[.]37[.]100<\/p>\n<p><strong>URLs \u2013<\/strong><br \/>\nantowortensienicht@bzst-infomieren[.]icu<br \/>\ninfo@agenziaentrate[.]icu<br \/>\nantwortensienicht@bzstinform[.]icu<br \/>\nuspsdelivery-service[.]com<br \/>\nhxxp:\/\/198[.]50[.]168[.]67\/wordpack[.]tmp<br \/>\nhxxp:\/\/conbase[.]top\/sys[.]bat<br \/>\nhxxp:\/\/104[.]168[.]198[.]208\/wordupd[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]215[.]54\/wordupd[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]174[.]32\/wordupd_3.0.1[.]tmp<br \/>\nhxxp:\/\/192[.]119[.]68[.]225\/wordupd1[.]tmp<br \/>\nhxxp:\/\/108[.]174[.]199[.]10\/wordupd3[.]tmp<br \/>\nhxxp:\/\/54[.]39[.]233[.]175\/wupd19823[.]tmp<br \/>\nhxxp:\/\/54[.]39[.]233[.]131\/word1[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]198[.]230\/wordupd[.]tmp<br \/>\nhxxp:\/\/92[.]63[.]17[.]245<br \/>\nhxxp:\/\/92[.]63[.]37[.]100<br \/>\nhxxp:\/\/92[.]63[.]29[.]137<br \/>\nhxxp:\/\/92[.]63[.]8[.]47<br \/>\nhxxp:\/\/92[.]63[.]194[.]3<br \/>\nhxxp:\/\/92[.]63[.]11[.]151<br \/>\nhxxp:\/\/92[.]63[.]32[.]57<br \/>\nhxxp:\/\/92[.]63[.]15[.]8<br \/>\nhxxp:\/\/92[.]63[.]32[.]55<br \/>\nhxxp:\/\/92[.]63[.]194[.]20<br \/>\nhxxp:\/\/92[.]63[.]15[.]6<br \/>\nhxxp:\/\/92[.]63[.]32[.]52<br \/>\nhxxp:\/\/92[.]63[.]15[.]56<br \/>\nhxxp:\/\/92[.]63[.]32[.]2<\/p>\n<p><strong>Hash Values (SHA256) \u2013<\/strong><br \/>\n44991186a56b0d86581f2b9cc915e3af426a322d5c4f43a984e6ea38b81b7bed<br \/>\ncfd8e3a47036c4eeeb318117c0c23e126aea95d1774dae37d5b6c3de02bdfc2a<br \/>\n9f2139cc7c3fad7f133c26015ed3310981de26d7f1481355806f430f9c97e639<br \/>\n5f1e512d9ab9b915b1fc925f546ed559cbfa49df53229e2f954a1416cf6f5ee4<br \/>\n97043f23defd510607ff43201bb03b9916a23bd71b5bdf97db357e5026732506<br \/>\nd617fd4b2d0824e1a7eb9693c6ec6e71447d501d24653a8e99face12136491a8<br \/>\n7e3ab96d2628e0a9970802b47d0356dc9b99994d7f98492d4e70a5384891695a<br \/>\ndee863ffa251717b8e56a96e2f9f0b41b09897d3c7cb2e8159fcb0ac0783611b<br \/>\nb345697c16f84d3775924dc17847fa3ff61579ee793a95248e9c4964da586dd1<br \/>\n5a900fd26a4ece38de5ca319b5893f96c7e9e2450dbac796c12f85b99238ec18<br \/>\ne8a091a84dd2ea7ee429135ff48e9f48f7787637ccb79f6c3eb42f34588bc684<\/p>\n<p><strong>Associated Filenames \u2013<\/strong><br \/>\nDECRYPT-FILES[.]html<br \/>\n%ProgramData%\\foo[.]dat<\/p>\n<p><strong>Associated Email Addresses \u2013<\/strong><br \/>\nfiledecryptor[@]nuke[.]africa<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Indicators of Compromise (IOC&#8217;s) [25th November 2019] \u2013<\/strong><\/h3>\n<p><strong>Hash Values (SHA256) \u2013<\/strong><br \/>\n44991186a56b0d86581f2b9cc915e3af426a322d5c4f43a984e6ea38b81b7bed<br \/>\ncfd8e3a47036c4eeeb318117c0c23e126aea95d1774dae37d5b6c3de02bdfc2a<br \/>\n9f2139cc7c3fad7f133c26015ed3310981de26d7f1481355806f430f9c97e639<br \/>\n5f1e512d9ab9b915b1fc925f546ed559cbfa49df53229e2f954a1416cf6f5ee4<br \/>\n97043f23defd510607ff43201bb03b9916a23bd71b5bdf97db357e5026732506<br \/>\nd617fd4b2d0824e1a7eb9693c6ec6e71447d501d24653a8e99face12136491a8<br \/>\n7e3ab96d2628e0a9970802b47d0356dc9b99994d7f98492d4e70a5384891695a<\/p>\n<p><strong>Associated Email Addresses<\/strong> <strong>\u2013<\/strong><\/p>\n<p>antowortensienicht@bzst-infomieren[.]icu<br \/>\ninfo@agenziaentrate[.]icu<br \/>\nantwortensienicht@bzstinform[.]icu<\/p>\n<p><strong>Domains<\/strong> <strong>\u2013<\/strong><\/p>\n<p>uspsdelivery-service[.]com<br \/>\nhxxp:\/\/198[.]50[.]168[.]67\/wordpack[.]tmp<br \/>\nhxxp:\/\/conbase[.]top\/sys[.]bat<br \/>\nhxxp:\/\/104[.]168[.]198[.]208\/wordupd[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]215[.]54\/wordupd[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]174[.]32\/wordupd_3.0.1[.]tmp<br \/>\nhxxp:\/\/192[.]119[.]68[.]225\/wordupd1[.]tmp<br \/>\nhxxp:\/\/108[.]174[.]199[.]10\/wordupd3[.]tmp<br \/>\nhxxp:\/\/54[.]39[.]233[.]175\/wupd19823[.]tmp<br \/>\nhxxp:\/\/54[.]39[.]233[.]131\/word1[.]tmp<br \/>\nhxxp:\/\/104[.]168[.]198[.]230\/wordupd[.]tmp<\/p>\n<p>&nbsp;<\/p>\n<p><strong>References \u2013<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/it-services-giant-cognizant-suffers-maze-ransomware-cyber-attack\/#inbox\/_blank\">https:\/\/www.bleepingcomputer.com\/news\/security\/it-services-giant-cognizant-suffers-maze-ransomware-cyber-attack\/<\/a><\/li>\n<li><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ransomware-maze\/#inbox\/_blank\">https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ransomware-maze\/<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Note &#8211; This blog post is an updating story and was last updated on April 22, 2020.<\/strong><\/p>\n<p><em>Blog Author &#8211;<\/em><\/p>\n<p><em>Poornima J.<\/em><\/p>\n<p><em>Managed SOC Consultant<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction to Maze Ransomware &#8211; Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in the month of May&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2976,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[269,270,288,266,273],"tags":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack &amp; Exploitation Techniques.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Organizations Hit by Maze Ransomware Attack &amp; Exploitation\" \/>\n\t\t<meta property=\"og:description\" content=\"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack &amp; Exploitation Techniques.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t\t<meta property=\"article:section\" content=\"Data Breaches\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-04-19T16:40:18+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:44:49+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Organizations Hit by Maze Ransomware Attack &amp; Exploitation\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack &amp; Exploitation Techniques.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#article\",\"name\":\"Organizations Hit by Maze Ransomware Attack & Exploitation\",\"headline\":\"Organizations Hit by Maze Ransomware Attack !!\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Maze-1.jpg\",\"width\":860,\"height\":520,\"caption\":\"Maze\"},\"datePublished\":\"2020-04-19T16:40:18+05:30\",\"dateModified\":\"2022-12-02T15:14:49+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":2,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#webpage\"},\"articleSection\":\"Data Breaches, Data Leakage, Ransomware Attack, Security Advisory, Security Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#listItem\",\"position\":2,\"name\":\"Organizations Hit by Maze Ransomware Attack !!\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/\",\"name\":\"Organizations Hit by Maze Ransomware Attack & Exploitation\",\"description\":\"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack & Exploitation Techniques.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Maze-1.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#mainImage\",\"width\":860,\"height\":520,\"caption\":\"Maze\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/organizations-hit-by-maze-ransomware-attack\\\/#mainImage\"},\"datePublished\":\"2020-04-19T16:40:18+05:30\",\"dateModified\":\"2022-12-02T15:14:49+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Organizations Hit by Maze Ransomware Attack &amp; Exploitation<\/title>\n\n","aioseo_head_json":{"title":"Organizations Hit by Maze Ransomware Attack & Exploitation","description":"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack & Exploitation Techniques.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Organizations Hit by Maze Ransomware Attack &amp; Exploitation","og:description":"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack &amp; Exploitation Techniques.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","og:image:width":"860","og:image:height":"520","article:section":"Data Breaches","article:published_time":"2020-04-19T16:40:18+00:00","article:modified_time":"2022-12-02T09:44:49+00:00","twitter:card":"summary_large_image","twitter:title":"Organizations Hit by Maze Ransomware Attack &amp; Exploitation","twitter:description":"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack &amp; Exploitation Techniques.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"7 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#article","name":"Organizations Hit by Maze Ransomware Attack & Exploitation","headline":"Organizations Hit by Maze Ransomware Attack !!","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","width":860,"height":520,"caption":"Maze"},"datePublished":"2020-04-19T16:40:18+05:30","dateModified":"2022-12-02T15:14:49+05:30","inLanguage":"en-US","commentCount":2,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#webpage"},"articleSection":"Data Breaches, Data Leakage, Ransomware Attack, Security Advisory, Security Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#listItem","position":2,"name":"Organizations Hit by Maze Ransomware Attack !!","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/","name":"Organizations Hit by Maze Ransomware Attack & Exploitation","description":"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019. Here is Maze Ransomware Attack & Exploitation Techniques.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#mainImage","width":860,"height":520,"caption":"Maze"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/#mainImage"},"datePublished":"2020-04-19T16:40:18+05:30","dateModified":"2022-12-02T15:14:49+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2358","title":"Organizations Hit by Maze Ransomware Attack &amp; Exploitation","description":"Maze ransomware is also known as ChaCha, is a ransomware that had been first discovered in 2019.&nbsp;Here is Maze Ransomware Attack &amp; Exploitation Techniques.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Maze Ransomware\",\"score\":100,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Maze Ransomware Attack\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Ransomware Attack\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Maze-1.jpg","og_image_width":"860","og_image_height":"520","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Data Breaches","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 09:45:08"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-breaches\/\" title=\"Data Breaches\">Data Breaches<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tOrganizations Hit by Maze Ransomware Attack !!\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Breaches","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-breaches\/"},{"label":"Organizations Hit by Maze Ransomware Attack !!","link":"https:\/\/www.varutra.com\/varutravrt3\/organizations-hit-by-maze-ransomware-attack\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2358"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2358"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2358\/revisions"}],"predecessor-version":[{"id":17800,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2358\/revisions\/17800"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2976"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}