{
	"id": "5b19918b-33f3-46d4-9e1d-d67ac9b15be6",
	"created_at": "2026-04-06T00:12:02.776946Z",
	"updated_at": "2026-04-10T03:20:43.261442Z",
	"deleted_at": null,
	"sha1_hash": "b6832e689771d9b5b96d7714e6dc6ee129739ba4",
	"title": "Maze ransomware group hacks oil giant; leaks data online",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 102972,
	"plain_text": "Maze ransomware group hacks oil giant; leaks data online\r\nBy Deeba Ahmed\r\nPublished: 2020-04-06 · Archived: 2026-04-05 22:31:33 UTC\r\nOn April 1st, 2020, Berkine became a victim of cyber-attack by the notorious Maze ransomware group that is\r\nknown for its unique blackmailing practices.\r\nThe attackers managed to steal the entire database containing over 500MB of confidential documents related to\r\nbudgets, organizational strategies, production quantities, and similar sensitive data. \r\nThe Maze ransomware group leaked the database containing information about the Sonatrach oil firm.\r\nSee: Terabytes of OnlyFans data being sold on hacking forum\r\nBerkine is a joint venture of Algeria’s state-owned oil firm Sonatrach and Anadarko Algeria Company, a\r\nsubsidiary of a US-based firm previously known as Anadarko Petroleum Corp. and currently Oxy Occidental.\r\nDiscover more\r\nHacking news portal\r\nPenetration testing services\r\nVPN subscriptions\r\nAccording to Under the Breach, a service that exclusively monitors data breaches and works for its prevention\r\nstated that the documents posted online are related to financial details and investment plans of the company.\r\nThe leaked data includes the Berkine group’s cost price per barrel, organizational goals for the year 2020, and\r\nbudgets allocated for various missions of the two owners of Berkine. The database also contains a list of Berkine\r\nemployees including their contact details and travel documents of some of them. \r\nhttps://www.hackread.com/maze-ransomware-group-hacks-oil-giant-leaks-data/\r\nPage 1 of 3\n\nThe screenshot shows leaked data on Maze ransomware group’s website (Via Under The Breach)\r\nThe maze ransomware group has quickly become the biggest threat to organizations around the world. The French\r\nNational Agency for Security of Information Systems (ANSSI) examined this group after it attacked a subsidiary\r\nof Bouygues in January 2020.\r\nSee: Digital wallet app leaks millions of users’ credit cards \u0026 Govt IDs\r\nAs per the ANSSI, the group has been active since May 2019 and “is mainly known to be associated with Internet\r\ndisclosures of information presented as originating from compromised information systems”.\r\nDiscover more\r\nApple security patches\r\nInternet \u0026 Telecom\r\nIdentity Theft Protection\r\nThe Maze ransomware, assessed ANSSI, is a variant of the ChaCha20 cryptographic algorithm, which is one of\r\nthe most feared data encryption software.\r\nThe agency also identified that the group employs extreme tactics to pressurize the victims who refuse to pay the\r\nransom or delay the payment. They, not only encrypt the data but also exfiltrate it prior to encrypting it and later\r\nuse it to blackmail the victim into paying their desired ransom.\r\nMoreover, the group keeps releasing some of the data and even post it on hacker forums for phishing purposes if\r\nthe victim doesn’t give in to their demands.\r\nDid you enjoy reading this article? Like our page on Facebook and follow us on Twitter.\r\nhttps://www.hackread.com/maze-ransomware-group-hacks-oil-giant-leaks-data/\r\nPage 2 of 3\n\nSource: https://www.hackread.com/maze-ransomware-group-hacks-oil-giant-leaks-data/\r\nhttps://www.hackread.com/maze-ransomware-group-hacks-oil-giant-leaks-data/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.hackread.com/maze-ransomware-group-hacks-oil-giant-leaks-data/"
	],
	"report_names": [
		"maze-ransomware-group-hacks-oil-giant-leaks-data"
	],
	"threat_actors": [],
	"ts_created_at": 1775434322,
	"ts_updated_at": 1775791243,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/b6832e689771d9b5b96d7714e6dc6ee129739ba4.pdf",
		"text": "https://archive.orkl.eu/b6832e689771d9b5b96d7714e6dc6ee129739ba4.txt",
		"img": "https://archive.orkl.eu/b6832e689771d9b5b96d7714e6dc6ee129739ba4.jpg"
	}
}