• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      Computing Tech Marketing & Innovation Awards
      • Date: 12 Jun 2020
      • TBC, London
      event logo
      AI & Machine Learning Awards 2020

      The Computing AI & Machine Learning Awards recognise the best companies, individuals, and projects in the AI space today. The awards cover every corner of the industry: security, ethics, data analysis, innovation and more, as well as showcasing the movers and shakers: the technology heroes and projects that deserve industry-wide praise. The winners will be announced in London on 1 July 2020. Entries are now open!

      • Date: 01 Jul 2020
      • TBC, London
      Digital Technology Leader Awards

      For too long the limelight has shone exclusively on marketing staff. The Computing Digital Technology Leaders Awards exist to recognise the achievements of the individuals and companies who are really making it happen at the coal face of the digital technology stack: from website design and coding to UX and project management, from scrum masters and product managers, all the way up to the CDO.

      • Date: 08 Jul 2020
      • London TBC, London
      event logo
      Computing DevOps Live 2020
      • Date: 14 Jul 2020
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    •  

       

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Hacking

Maze ransomware group claims to have encrypted Chubb cyber insurer's systems

Chubb rejects the ransomware pgroup's claim, however, saying its network is fully operational

Maze ransomware group says it has encrypted Chubb cyber insurer's systems
Maze ransomware group says it has encrypted Chubb cyber insurer's systems
  • Dev Kundaliya
  • 27 March 2020
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Commercial insurance firm Chubb, which also provides cyber security insurance, has allegedly been hit by a cyber attack.

According to BleepingComputer, Maze ransomware operators claim to have successfully attacked the systems of insurance giant and stolen a large amount of personally identifiable information from its systems.

The group said that the attack was carried out in March 2020, in which they encrypted the computers on Chubb's network.

Maze has not yet released any of the stolen data publically, according to BleepingComputer, except the email addresses of some executives, including CEO Evan Greenberg, Vice Chairman John Lupica, and COO John Keogh.

The ransomware operators refused to provide further details about the attack at this time.

In a statement, Chubb said that they were currently probing a computer security incident with the help of a leading cyber security firm and law enforcement agencies.

The company claimed it has found no evidence of a breach so far, and that the security incident might have involved unauthorised access to data held by a third-party service provider.

The company said that its network "remains fully operational" and it was able to serve "all policyholder needs" without any issue.

"We will provide further information as appropriate," the company said.

Commenting on the cyber incident, cyber security intelligence firm Bad Packets said that Chubb has been using many Citrix ADC servers that are vulnerable to the CVE-2019-19871 security flaw. Bad Packets said that hackers have exploited this particular bug in past months to install ransomware on networks.

Our initial CVE-2019-19781 scans found five vulnerable Chubb Citrix (NetScaler) servers:
sf-masterpoc.chubb[.]com
sf-xaa.chubb[.]com
vdi.chubblatinamerica[.]com
74.120.45.203 (no forward DNS)
74.120.45.238 (no forward DNS) https://t.co/LFwjWBMoG8

— Bad Packets Report (@bad_packets) March 26, 2020

Phobos Group's Dan Tentler also claimed that a Remote Desktop server being used by Chubb is publicly accessible from the internet.

Maze ransomware, which was allegedly used in the cyber attack against Chubb, not only encrypts all the devices in its path, but before that also exfiltrates user files to malicious servers used by the ransomware operators. 

The group then uses the data as leverage to demand a ransom from victims. If they refuse to pay-up, their data can be published online by the group.

Last year, the FBI issued an advisory to alert businesses about a spike in Maze-related cyber incidents.

In January, Maze operators threatened to release the data stolen from several victims who had refused to pay the ransom, a strategy more and more ransomware groups have adopted. 

Earlier in December, the group published on their website a subset of data stolen from wire and cable manufacturer Southwire after the company refused to cooperate with their $6 million ransom demand.

The group also published on its website the names of 25 victims that included Busch's Inc., BST & Co., Southwire, Lakeland Community College, RBC, Vernay, BILTON, Bakerwotring, THEONE, Groupe Igrec, Mitch Co International, Groupe Europe Handling, Fratelli Beretta, Auteuil Tour Eiffel, Randalegal, and MDL.

  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Hacking
  • Maze ransomware
  • Chubb
  • Evan Greenberg
  • John Lupica

More on Hacking

Five zero-days were used by an advanced hacking group last year to target individuals inside North Korea
South Korean APT uses five zero-day flaws to turn the tables on North Korea

The group, linked to South Korea, used bugs in Internet Explorer, Google Chrome and the Windows Kernel to target North Koreans

  • Hacking
  • 27 March 2020
Cyber security experts join hands to block coronavirus-related cyber campaigns
Cyber security experts collaborate to block coronavirus-related cyber campaigns

The new group includes professionals from technology firms like Amazon and Microsoft

  • Hacking
  • 26 March 2020
Tupperware website infected with payment card skimmer
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group

  • Hacking
  • 26 March 2020
It's not known how much information was compromised in one of the largest China-sourced cyber attacks to date
Surge in attacks from China-linked APT41 targeting unpatched Citrix servers and Cisco routers

APT41 attacks carried out between January and March targeted unsecured Citrix NetScaler servers and Cisco routers

  • Security
  • 25 March 2020
Spanish hospitals have been targeted with coronavirus-themed ransomware
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks

Groups behind Netwalker switched phishing baits to coronavirus last week - as other ransomware groups pledged to avoid medical facilities

  • Security
  • 24 March 2020
blog comments powered by Disqus
Back to Top

Most read

Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
Working from home, keeping connected: 17 video conferencing and collaboration tools to consider
How Hillarys responded to the coronavirus outbreak
How Hillarys responded to the coronavirus outbreak
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
Spanish hospitals targeted with coronavirus-themed phishing lures in Netwalker ransomware attacks
South Korean APT uses five zero-day flaws to turn the tables on North Korea
South Korean APT uses five zero-day flaws to turn the tables on North Korea
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
Microsoft: Two zero-day vulnerabilities in Windows Adobe Type Manager Library are actively being exploited
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading