Accenture falls victim to ransomware
Accenture; one of the biggest IT Consultancies in the world has recently been hit by a ransomware attack carried out by Lockbit 2.0 operators. This was publicly disclosed on Lockbit’s leaks site where they were demanding a staggering $50,000,000
Accenture is known to work with a multitude of clients across a wide array of industries as outlined on their Case Studies & Stories section and as such, it employs over half a million people in as many as 50 different countries; This shows the potential reach for a cyberattack such as this, potentially endangering sensitive data from all parties involved (Company, employees and clients alike)
“These people are beyond privacy and security. I really hope that their services are better than what I saw as an insider. If you’re interested in buying some databases reach us” is posted on their leak site as a message below their counter for publishing all the leaked files
More on the attack
Although the main goal of a ransomware attack is usually to encrypt files in exchange for money, Accenture stated that they were able to quickly recover the affected system "We fully restored our affected systems from backup, and there was no impact on Accenture’s operations, or on our clients’ systems." but at this point, the damage was already done, the attackers had already extracted the files from the affected systems.
On Codenotary Cloud
At Codenotary we understand how important it is to secure your systems to prevent this and many other similar incidents but more importantly, we detected the need for a robust solution that didn’t depend on digital dertificates because of how cumbersome things can be once a certificate is revoked (For more information on digital certificates, read our blog post on them).
With our Codenotary Cloud and its multiple integrations you can prevent this and many other types of cyberattacks by only introducing or releasing software that you can not only trust but also cryptographically verify to prevent unauthorized or tampered versions from ever reaching those systems.
To learn more about how you can implement end-to-end zero-trust protection for your CI pipelines and deployments visit Codenotary and signup for the Cloud version.