(844) 627-8267 | Info@NationalCyberSecurity
(844) 627-8267 | Info@NationalCyberSecurity

Windows ransomware group Cl0P leaks some PwC files on clear web | #ransomware | #cybercrime

Windows ransomware group Cl0p has released some of the data it stole from consultancy firm PwC on the clear web. The attackers have claimed to be in possession of 121GB of data plus archives.

The breach was effected through vulnerabilities in the secure managed file transfer software MOVEit Transfer. The number of companies and organisations impacted is now up to 379, with more than 19 million individuals affected.

Cl0P first breached PwC in May. The firm acknowledged it had suffered an intrusion through MOVEit, telling the Australian Financial Review on 19 June: “We are aware that MOVEit, a third-party transfer platform, has experienced a cyber security incident which has impacted hundreds of organisations including PwC.”

While Cl0p has divided the files stolen from PwC into 11 batches and listed all on the dark web, only four of these batches have been listed on the clear web.

There is a spelling mistake in the URL of the site on the clear web; technology industry sources told iTWire that this could be intentional, with a threat to correct it, and thus make the site easier to find, serving as an additional means of leverage.

However, these sources did not rule out that the misspelling represented a screw-up by the Cl0p gang.

The data leak adds to the woes that PwC is facing, with parliamentarians going after the company for having used confidential information provided to it by the Australian tax Office to enable its clients avoid paying taxes.

Cl0p has been around since 2019. In its first attacks, the group encrypted files of victims and then demanded a ransom for an decryption key.

However, more recently, the group has been stealing data and then trying to get a ransom payment by a threat to release the files online. iTWire has contacted PwC for comment.


You probably know that we are big believers in Network Detection and Response (NDR).

Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?

Picking the right NDR for your team and process can sometimes be the biggest challenge.

If you want to try out a Network Detection and Response tool, why not start with the best?

Vectra Network Detection and Response is the industry’s most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.

Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.



It’s all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Source link

National Cyber Security