{"id":30647,"date":"2020-11-06T08:00:21","date_gmt":"2020-11-06T15:00:21","guid":{"rendered":"https://www.webroot.com/blog/?p=30647"},"modified":"2020-11-05T15:11:22","modified_gmt":"2020-11-05T22:11:22","slug":"cyber-news-rundown-maze-ransomware-shuts-down","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/11\/06\/cyber-news-rundown-maze-ransomware-shuts-down\/","title":{"rendered":"Cyber News Rundown: Maze Ransomware Shuts Down"},"content":{"rendered":"\n<h2>Maze Ransomware Group Ends Operations<\/h2>\n\n\n\n<p>A press release issued this week announced the end of the <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/maze-ransomware-shuts-down-operations-denies-creating-cartel\/\">Maze<\/a>\nransomware group\u2019s data theft operations. In the release, the Maze authors revealed\ntheir motives behind one of the most successful ransomware campaigns to date,\nand why they chose to finally shut down their massive project. It also stated the\nMaze team was working to expose the major security holes key industries fail to\naddress, though their methods created many victims. &nbsp;<\/p>\n\n\n\n<h2>Magecart Targets International Gold Retailer<\/h2>\n\n\n\n<p>Nearly three months after a data breach caused by a Magecart\nattack struck the international precious metals retailer, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/gold-bullion-seller-hit-by\/\">JM\nBullion<\/a> has finally released an official statement to customers. After\nidentifying unauthorized activity on their systems in the mid-July, the company\nwent on to find that their systems had been compromised since February by\nMagecart payment card-skimming software. The company has yet to acknowledge why\ntook so long to discover the breach or why it failed to follow GDPR regulations\nby immediately contacting affected customers. <\/p>\n\n\n\n<h2>Ryuk Remains Top Player Throughout 2020<\/h2>\n\n\n\n<p>With ransomware continuing its stay at the top of the cyberthreat\nthrone, <a href=\"https:\/\/www.helpnetsecurity.com\/2020\/11\/03\/ryuk-ransomware-2020\/\">Ryuk<\/a>\nvariants have been responsible for over a third of all ransomware attacks in 2020\nalone or roughly 67 million attacks. Ryuk has been around for over two years,\nbut found much greater success this year after being found responsible for only\n5,100 attacks in 2019. Ransomware attacks grew 40 percent over last year, to\nnearly 200 million as of Q3. <\/p>\n\n\n\n<h2>Cannabis Site Leaves Database Exposed<\/h2>\n\n\n\n<p>An unsecured database belonging to cannabis website <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/weak-hash-exposes-millions\/\">GrowDiaries<\/a>\nand housing over 3.4 million user records was found to be accessible last month.\nThe data included 1.4 million user passwords that were encrypted using MD5\nhashing, which is known to be easily unlocked by cybercriminals. Nearly a week\nafter being informed of the database GrowDiaries properly secured it from\npublic access, though it remains unclear how long it was accessible or who\naccessed it during that time. <\/p>\n\n\n\n<h2>Mattel Reveals Ransomware Attack<\/h2>\n\n\n\n<p>Following a July ransomware attack, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/leading-toy-maker-mattel-hit-by-ransomware\/\">Mattel<\/a>\nhas finally issued an official statement regarding the overall damage. The\ncompany has confirmed that no data was stolen during the attack, which was\nquickly identified by their security, and many systems were taken offline to\nprevent any damage or theft occured. The ransomware attack was likely perpetrated\nby TrickBot, as it&#8217;s known for concentrating on large organizations and leaving\nthem exposed for some encrypting variant to follow. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maze Ransomware Group Ends Operations A press release issued this week announced the end of the Maze ransomware group\u2019s data theft operations. In the release, the Maze authors revealed their motives behind one of the most successful ransomware campaigns to date, and why they chose to finally shut down their massive project. It also stated [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":30649,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30647"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30647"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30647\/revisions"}],"predecessor-version":[{"id":30651,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30647\/revisions\/30651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30649"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30647"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30647"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}