Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

MAZE: How to Successfully Neutralize Ransomware Attacks

by Jackie Davis
July 22, 2020
in Cybersecurity
Reading Time: 3 mins read
A A
MAZE: How to Successfully Neutralize Ransomware Attacks
Share on FacebookShare on Twitter

Last year, the U.S. was targeted with a growing number of ransomware attacks that affected at least 948 government agencies, educational institutions, and healthcare practices. These attacks are estimated to have cost about $7.5 billion. MAZE ransomware, responsible for many of these attacks, was identified in May of 2019. This ransomware is particularly devastating to the public sector, especially because not only did it encrypt email, but it promised to extort the organizations using the data they had acquired.

In a recent webinar titled Navigating the MAZE, Kimberly Goody, Sr. Manager, Mandiant Threat Intelligence and Jeremy Kennelly, Manager, Mandiant Threat Intelligence explored how MAZE ransomware is impacting the public sector and the steps agencies can take to combat these threats. MAZE, Goody explained, is a combination of traditional ransomware attacks that is even more insidious.  The bad actors launching these MAZE attacks operate a public-facing website where stolen data is posted from targets that refuse to pay the ransom.

Watch the Webinar

“MAZE is a fully secured ransomware. When it was first discovered the ransomware was typically being distributed as spam campaigns,” she said. The bad actors then move laterally throughout a network encrypting files and asking for ransom and if not met, valuable data that has been exfiltrated is leaked online, she explained.

According to the recent Security Effectiveness Report by FireEye, 68 percent of ransomware attacks go unnoticed. The damage done by unnoticed ransomware attacks is not only costly but potentially hazardous if classified information or citizen data is stolen. To effectively detect and neutralize ransomware threats, agencies must look to technology that is proactive, not just reactive to breaches. MAZE becomes even more difficult to detect with multiple bad actors, said Kennelly. “One actor may distribute multiple ransomware families,” he explained. “Because there are so many bad actors, there isn’t just one playbook that can be followed,” said Goody.

Multiple advanced threats like MAZE ransomware can be neutralized by technology that takes an agency-wide approach, shared Kennelly. Join Goody and Kennelly to learn more about MAZE ransomware, common intrusion vectors, and how MAZE attacks are accessing systems.

Watch the webinar.

Tags: FireEyeMandiantMAZERansomwareSecurity Effectiveness Report

RELATED POSTS

defending against ransomware
Cybersecurity

Defending Against the Inevitable: Smart Strategies for Defeating Ransomware

June 15, 2022
Public Sector Day 2022
Cybersecurity

Public Sector Day 2022 Increases Accessibility While Emphasizing Key Topics Impacting Government

May 25, 2022
Gary Peters
Civilian

Sen. Gary Peters and SolarWinds CEO, Sudhakar Ramakrishna, Discuss Cybersecurity Challenges

February 8, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5378 shares
    Share 2151 Tweet 1345
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    42 shares
    Share 17 Tweet 11
  • The Future for the Air Force Depends on Agility and Resilience at the Edge

    83 shares
    Share 33 Tweet 21
  • Design Secure Application Software That Transforms Government Agencies

    12 shares
    Share 5 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us