High
Maze aka ChaCha an infamous ransomware group in its recent statement released on its victim shaming website claims to have hacked into the Bank of Cost Rica in August 2019 but didn’t pursue the further attack citing reason that possible damage would be too high and in February 2020 during their routine check of previously accessed system they found out the bank security wasn’t improved they still had access to the bank network, Maze claims to have obtained years of transnational data including credit cards data of 11million with 4million unique credit cards in which 140,000 belongs to US citizens.
As proof of this theft, Maze posted what they say are 240 credit card numbers, with the last four digits removed, along with expiration dates and credit card verification codes (CVC).
Bank of Cost Rica is a state-owned commercial bank that operates in Costa Rica. With an equity of $806,606,710 and assets of $7,607,483,881, Founded in April 20, 1877 the bank of Cost Rica has established itself as one of the strongest banking companies in both Costa Rica and Central America.
The Maze ransomware, previously known in the community as “ChaCha ransomware” uses 2048 bit Rivest-Shamir-Adleman(RSA) and the ChaCha20 stream cipher to encrypt individual files. It appends different extensions to the files during theencryption process. It then changes the user’s desktopwallpaper to a message about the encrypted files and the file name ofthe dropped ransom note. A notable feature of Maze ransomware is that it sets the ransomware amount based on the type ofdevice it detects.This is uncommon among other types of ransomware. Maze operators have used the following labels to indicate the user’s computer type in the wallpaper message:
• standalone server • server in corporate network • workstation in corporate network • home computer • primary domaincontroller • backup server • very valuable for you
Maze Ransomware is distributed using several different ways. It has utilized the Spelevo and Fallout exploit kits and one of the vulnerabilities that Maze is targeting is the CVE-2018-15982 vulnerability in Flash Player. It is also worth noting that in the case of the Fallout kit, the users were redirected to the exploit from a fake cryptocurrency trading platform.Another observed attack vector is via email spam campaigns containing a Microsoft Office document with a malicious macro. For technical analysis of Maze ransomware please check Advisory # 7186.
SHA-256
Organizations can be targeted specifically by attackers, or they can be caught in the wide net cast by cyber crime operations. Large organizations are high value targets and attackers can demand bigger ransoms.
It is recommended to :