{
	"id": "b487569e-56b0-4128-9cee-36dfe7f963ab",
	"created_at": "2026-04-06T00:06:06.899507Z",
	"updated_at": "2026-04-10T03:22:10.3294Z",
	"deleted_at": null,
	"sha1_hash": "cc3e22df17ab13ceff3ffdb1bb1f94cf49d9e0d3",
	"title": "Maze Ransomware Releases Files Stolen from City of Pensacola",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 835276,
	"plain_text": "Maze Ransomware Releases Files Stolen from City of Pensacola\r\nBy Lawrence Abrams\r\nPublished: 2019-12-24 · Archived: 2026-04-05 13:18:36 UTC\r\nThe actors behind the Maze Ransomware have released 2GB of files that were allegedly stolen from the City of Pensacola\r\nduring their ransomware attack.\r\nEarlier this month, the City of Pensacola was hit with a ransomware attack that impacted the city's email service, some\r\nphone service, and caused them to shut down their computer systems.\r\nIt was later confirmed by BleepingComputer that they were attacked by the Maze Ransomware who stated they stole data\r\nfrom the city before encrypting the network. They then demanded a $1 million ransom to decrypt their files.\r\nhttps://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nYesterday, the Maze actors released 2GB of the 32GB of files that they state they stole from the city before encrypting the\r\nnetwork.\r\nAlleged Proofs of Stolen Data\r\nIn a discussion with BleepingComputer, the Maze actors stated that they released the stolen data to prove to the media that\r\nthey steal more than just a few files during a ransomware attack.\r\n\"This the fault of mass media who writes that we don't exfiltrate data more than a few files. We did not want to make a\r\npressure on city, we still dont make it right now. We've shown that our intentions are real.\"\r\nWhen BleepingComputer asked if they intended to release the rest of the data, they responded with \"It depends\".\r\nBleepingComputer has also contacted the City of Pensacola, but have not heard back as of yet.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nhttps://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/\r\nPage 3 of 4\n\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/\r\nhttps://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/maze-ransomware-releases-files-stolen-from-city-of-pensacola/"
	],
	"report_names": [
		"maze-ransomware-releases-files-stolen-from-city-of-pensacola"
	],
	"threat_actors": [],
	"ts_created_at": 1775433966,
	"ts_updated_at": 1775791330,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/cc3e22df17ab13ceff3ffdb1bb1f94cf49d9e0d3.pdf",
		"text": "https://archive.orkl.eu/cc3e22df17ab13ceff3ffdb1bb1f94cf49d9e0d3.txt",
		"img": "https://archive.orkl.eu/cc3e22df17ab13ceff3ffdb1bb1f94cf49d9e0d3.jpg"
	}
}