Show vulnerabilities with patch / with exploit
26 June 2020

Maze ransomware operators allegedly hacked LG Electronics, stole 40 GB of sensitive data


Maze ransomware operators allegedly hacked LG Electronics, stole 40 GB of sensitive data

The malicious actors behind the Maze ransomware operation claim they have compromised the systems of the South Korean electronic goods manufacturer LG Electronics and obtained the highly sensitive information.

The Maze ransomware operators are typically target major organizations and not only encrypt their files but also threaten to release the stolen data to the public if the ransom demand is not paid.

According to Bleeping Computer, the Maze operators claim to have stolen 40 GB of source code from LG, including the source code of a product developed by LG for a major telecommunications company.

“Also, we would like to announce that in case of not contacting us today we will share information about attack on Lg. We downloaded 40GB of Python source codes from Lg. Developments for a biggest companies in US, we will share part of source code on Lg later,” the Maze group said.

While the ransomware operators did not disclosed the name of the affected company, the screenshots posted on their data leak site as a proof suggest it may be the US-based telecoms company AT&T.

Other screenshots published by Maze show split archive for a .KDZ file, the format for official stock firmware code from LG, and a snippet of Python code for an email forwarding project.

Currently, it is unknown how Maze managed to gain access to the LG’s network.

Earlier this month, the radio-frequency chip maker MaxLinear Inc. revealed it was hit by a Maze ransomware attack, in which the threat actors gained access to some of the company’s systems. On June 15, Maze ransomware operators leaked 10.3GB of accounting and financial information out of the over 1TB of data allegedly stolen from MaxLinear's systems, but the company said it has no plans to pay the ransom demand.

Back to the list

Latest Posts

Vulnerability summary for the week: July 10, 2020

Vulnerability summary for the week: July 10, 2020

Weekly vulnerability digest.
10 July 2020
Evilnum, FIN6, and Cobalt Group share the same malware provider

Evilnum, FIN6, and Cobalt Group share the same malware provider

The Evilnum group’s toolset and infrastructure have evolved and now include custom malware as well as tools bought from a MaaS provider called Golden Chickens.
10 July 2020
RCE-bug found in Zoom client for Windows

RCE-bug found in Zoom client for Windows

The flaw is only exploitable on systems running Windows 7 and older Windows versions.
10 July 2020