Accenture LockBit Ransomware Attack: 5 Things To Know
Joseph F. Kovar
Accenture says it contained the LockBit ransomware attack, but cybersecurity industry observers say they are seeing some Accenture confidential data being released, with promises of more to come. CRN looks at what is known so far about the attack.
The attack was first reported early Wednesday via a tweet from CNBC reporter Eamon Javers, who wrote that a hacker group on the dark web wrote, “These people are beyond privacy and security. I really hope that their services are better than what I saw as an insider. If you’re interested in buying some databases, reach us.”
The message was later amplified when VX Underground, which claims to have the Internet’s largest collection of malware source code, tweeted a timer supposedly from the hacker showing how much time before the attack on Accenture’s data starts. The time on the timer eventually passed.
The attack was a LockBit ransomware attack. LockBit, according to New Zealand-based cybersecurity company Emisisoft, is a strain of ransomware that prevents users from accessing infected systems until a ransom payment is made.
“It has been highly active since it emerged in September 2019 and has impacted thousands of organizations around the world. Many of LockBit’s attack functions are automated, making it one of the most efficient ransomware variants on the market,” Emisisoft wrote in a blog post.