Maze ransomware group claims to have encrypted Chubb cyber insurer's systems
Chubb rejects the ransomware pgroup's claim, however, saying its network is fully operational
Commercial insurance firm Chubb, which also provides cyber security insurance, has allegedly been hit by a cyber attack.
According to BleepingComputer, Maze ransomware operators claim to have successfully attacked the systems of insurance giant and stolen a large amount of personally identifiable information from its systems.
The group said that the attack was carried out in March 2020, in which they encrypted the computers on Chubb's network.
Maze has not yet released any of the stolen data publically, according to BleepingComputer, except the email addresses of some executives, including CEO Evan Greenberg, Vice Chairman John Lupica, and COO John Keogh.
The ransomware operators refused to provide further details about the attack at this time.
In a statement, Chubb said that they were currently probing a computer security incident with the help of a leading cyber security firm and law enforcement agencies.
The company claimed it has found no evidence of a breach so far, and that the security incident might have involved unauthorised access to data held by a third-party service provider.
The company said that its network "remains fully operational" and it was able to serve "all policyholder needs" without any issue.
"We will provide further information as appropriate," the company said.
Commenting on the cyber incident, cyber security intelligence firm Bad Packets said that Chubb has been using many Citrix ADC servers that are vulnerable to the CVE-2019-19871 security flaw. Bad Packets said that hackers have exploited this particular bug in past months to install ransomware on networks.
Our initial CVE-2019-19781 scans found five vulnerable Chubb Citrix (NetScaler) servers:
— Bad Packets Report (@bad_packets) March 26, 2020
sf-masterpoc.chubb[.]com
sf-xaa.chubb[.]com
vdi.chubblatinamerica[.]com
74.120.45.203 (no forward DNS)
74.120.45.238 (no forward DNS) https://t.co/LFwjWBMoG8
Phobos Group's Dan Tentler also claimed that a Remote Desktop server being used by Chubb is publicly accessible from the internet.
Maze ransomware, which was allegedly used in the cyber attack against Chubb, not only encrypts all the devices in its path, but before that also exfiltrates user files to malicious servers used by the ransomware operators.
The group then uses the data as leverage to demand a ransom from victims. If they refuse to pay-up, their data can be published online by the group.
Last year, the FBI issued an advisory to alert businesses about a spike in Maze-related cyber incidents.
In January, Maze operators threatened to release the data stolen from several victims who had refused to pay the ransom, a strategy more and more ransomware groups have adopted.
Earlier in December, the group published on their website a subset of data stolen from wire and cable manufacturer Southwire after the company refused to cooperate with their $6 million ransom demand.
The group also published on its website the names of 25 victims that included Busch's Inc., BST & Co., Southwire, Lakeland Community College, RBC, Vernay, BILTON, Bakerwotring, THEONE, Groupe Igrec, Mitch Co International, Groupe Europe Handling, Fratelli Beretta, Auteuil Tour Eiffel, Randalegal, and MDL.
More on Hacking
South Korean APT uses five zero-day flaws to turn the tables on North Korea
The group, linked to South Korea, used bugs in Internet Explorer, Google Chrome and the Windows Kernel to target North Koreans
Cyber security experts collaborate to block coronavirus-related cyber campaigns
The new group includes professionals from technology firms like Amazon and Microsoft
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript
Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers
APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities









