How to protect your IT infrastructure from a Maze ransomware attack
Maze is typically a sophisticated string of Windows ransomware that has hit several companies across the globe, demanding cryptocurrency payments in exchange for the recovery of encrypted data. Just like any other ransomware, Maze spreads across a corporate network, infects the computers it finds, and encrypts the data.
In what has been observed as a double extortion attack, the attackers steal the data they find, exfiltrate it to malicious servers, then demand a ransom for the safe recovery of data. This makes the Maze ransomware attack a deadly combination of a ransomware attack and a data breach.
Though recovering data from a secure backup might appear to be the solution, the fact that the attackers now have a copy of your organization's data cannot be overlooked.
What can happen if you ignore their demands?
The attackers now have access to your organization's sensitive data. If their demands are not met, the attackers can:
Release information about the security breach to the public and the media.
Impact your stock value by revealing sensitive pricing information.
Threaten your clients and partners with their information.
Backing up data using the 3-2-1 backup rule. This means to have at least 3 copies in 2 different formats, with 1 copy stored off-site.
Patch and update applications and programs regularly. This will ensure that the entry points for possible ransomware attacks are blocked.
Being vigilant against socially-engineered emails. Often, ransomware attacks are propagated as spam attachments.
Ensure that firewalls and intrusion prevention have been enabled in your network.
Deploy a comprehensive log management solution that can monitor your network and provide out-of-the-box reports.
Secure your on-premises, hybrid, and cloud platforms.
Thwart security attacks, and protect confidential data from breaches.
Gain deeper insights into network activity through in-depth network device auditing.
Spot anomalous user and entity behavior.
Automate the log management process, including logs from public cloud infrastructure.
Audit Active Directory, privileged user activity, and much more in real time.
Meet compliance requirements with ease.
Quickly implement post-breach actions through extensive forensic analysis capabilities.


Log360 leverages the information in threat feeds by correlating it with the log information collected. This ensures you're alerted when a malicious IP address or URL in the feed initiates a connection with the network.
To try out all these features and more, start your free, 30-day trial of Log360 today.
Comments