{
	"id": "a36ca69d-d33f-40a6-8419-460837aac168",
	"created_at": "2026-04-06T00:06:15.933171Z",
	"updated_at": "2026-04-10T03:37:32.785392Z",
	"deleted_at": null,
	"sha1_hash": "e3a4decfad0d3d3aa2ac971d4650fc15346c8c7d",
	"title": "Incident Response lessons from recent Maze ransomware attacks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 216682,
	"plain_text": "Incident Response lessons from recent Maze ransomware attacks\r\nBy Nick Biasini\r\nPublished: 2019-12-17 · Archived: 2026-04-05 21:38:14 UTC\r\nIncident Response lessons from recent Maze ransomware attacks\r\nTuesday, December 17, 2019 10:46\r\nBy JJ Cummings and Dave Liebenberg\r\n This year, we have been flooded with reports of targeted ransomware attacks. Whether it's a city, hospital, large-or medium-sized enterprise — they are all being targeted. These attacks can result in significant damage, cost, and\r\nhave many different initial infection vectors. Recently, Talos Incident Response has been engaged with a couple of\r\nthese attacks, which involved the use of targeted ransomware. The concept of targeted ransomware attacks is\r\nsimple: Get access to a corporate network, gain access to many systems, encrypt the data on a large chunk of\r\nthem, ask for a large lump sum payment to regain access to those systems, and profit.\r\nThe first widespread targeted ransomware attacks involved the SamSam ransomware, which Cisco Talos\r\nresearchers first discovered in early 2016 and were incredibly profitable, despite ending in indictments from the\r\nU.S. government.\r\nIn 2019, there have been multiple players in this space, the most prolific of which has been the Ryuk campaigns\r\nthat start with Emotet and Trickbot. Other targeted ransomware attacks have involved other types of ransomware\r\nand varied attack methodology. Included in this list is ransomware like LockerGoga, MegaCortex, Maze,\r\nRobbinHood, and Crysis, among others. More recently, attackers have taken the extra step of exfiltrating data and\r\nholding it hostage, which they claim they will release to the public unless payment is received, a form of doxxing.\r\nhttps://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nPage 1 of 5\n\nRecent incidents Over the past several months, Talos Incident Response responded to several such\r\nincidents, where an adversary gained access to an environment, deployed ransomware, and\r\nexfiltrated large amounts of data, combining elements of ransomware and doxxing attacks into a\r\nsingle incident.\r\nIn one incident, the attacker leveraged CobaltStrike after obtaining access to the network. CobaltStrike is a widely\r\nused framework for offensive and red-teaming, which is also commonly used by adversaries to attack their targets.\r\nOnce the adversary has access, they spend at least a week laterally moving around the network and gathering\r\nsystems and data along the way. Combined with CobaltStrike, the actor used a technique commonly associated\r\nwith APT-29, leveraging a named pipe (i.e. \\\\.\\pipe\\MSSE-\u003cnumber\u003e-server).\r\nOnce the actor gained enough access to both data and systems, the payment mechanisms began to take form. First,\r\nthe actor began exfiltrating the data that they had accumulated. They achieved exfiltration by using PowerShell to\r\nconnect to a remote FTP server. Below is a snippet of the code used to achieve this exfiltration via PowerShell.\r\nThe actor then deployed the Maze ransomware on the systems. Maze has been in the news recently as being the\r\nransomware used in several high-profile targeted ransomware attacks, including those against the city of\r\nPensacola, Florida and staffing firm Allied Universal.\r\nAnother incident involved more CobaltStrike, some shared infrastructure, and more exfiltration. In this case, the\r\nadversary was again found leveraging CobaltStrike post initial compromise and used PowerShell to dump large\r\namounts of data via FTP out of the network and demanded payment before disclosing this information publicly.\r\nThe connection to the previously mentioned incident lies in the command and control (C2) infrastructure used.\r\nThis actor dumped the data to the same C2 server as the aforementioned CobaltStrike incident. In addition to the\r\nhttps://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nPage 2 of 5\n\nshared infrastructure, there were a couple other commonalities between the attacks — the first being the\r\ndeployment and use of 7-Zip to compress the data they were preparing for exfiltration. Additionally, in both\r\nincidents, there were interactive logins via Windows Remote Desktop Protocol, remote PowerShell execution,\r\nwhich was achieved via WMIC, and in one case, active reconnaissance observed. Based on all of these facts, Talos\r\nassesses with high confidence these incidents were associated with the same adversary.\r\nConclusion The use of targeted ransomware attacks isn't new and, unfortunately, it's not going\r\nanywhere anytime soon. This is an extremely lucrative attack avenue for adversaries and as such,\r\nits popularity is likely only going to increase. What makes these particular attacks interesting is\r\nthe additional monetization avenue of exfiltrating data in the process. This allows the actor to\r\npotentially monetize their attack in multiple different ways. First, the actor can demand the\r\nvictim pay an additional fee to get the data back. Even if the victim refuses to pay the ransom due\r\nto proper precautions, like full backups and reliable recovery plans, money can be made. Second\r\nthe data itself could have significant value to other adversaries, and selling the data on the black\r\nmarket is highly likely. Finally, there is the public damage that can be done to the victim by\r\nreleasing the data, which doesn't give the attacker any monetary benefit but can be a very useful\r\nway to encourage future victims to pay and avoid the negative press associated with a public data\r\ndump.\r\nThis trend of achieving maximum monetary gain for their nefarious activities is increasingly common in the\r\ncrimeware space, as demonstrated by the proliferation of emotet and the millions and millions of dollars in\r\ndamage that have followed. Expect adversaries to be increasingly aware of the systems and networks they are\r\ncompromising as all systems and networks are not created equally and some have much higher profit margins,\r\nwhen compromised.\r\nIndicators of Compromise (IoCs)\r\nHashes: CobaltStrike\r\n51461b83f3b8afbcae46145be60f7ff11b5609f1a2341283ad49c03121e6cafe\r\n3627eb2e1940e50ab2e7b3ee703bc5f8663233fe71a872b32178cb118fb3e2d9 Maze Ransomware\r\n04e22ab46a8d5dc5fea6c41ea6fdc913b793a4e33df8f0bc1868b72b180c0e6e\r\n067f1b8f1e0b2bfe286f5169e17834e8cf7f4266b8d97f28ea78995dc81b0e7b\r\n1161b030293e58d15b6a6a814a61a6432cf2c98ce9d156986157b432f3ebcf78\r\n153defee225de889d2ac66605f391f4aeaa8b867b4093c686941e64d0d245a57\r\n195ef8cfabc2e877ebb1a60a19850c714fb0a477592b0a8d61d88f0f96be5de9\r\n30b72e83d66cbe9e724c8e2b21179aecd4bcf68b2ec7895616807df380afab54\r\n33afa2f1d53d5279b6fc87ce6834193fdd7e16e4b44e895aae4b9da00be0c502\r\n4080402553e9a86e954c1d9b7d0bb059786f52aba4a179a5d00e219500c8f43d\r\n5603a16cbf81d183d3ff4ffea5477af1a4be01321865f0978c0e128051ec0a82\r\n58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806\r\n5c9b7224ffd2029b6ce7b82ea40d63b9d4e4f502169bc91de88b4ea577f52353\r\nhttps://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nPage 3 of 5\n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\r\nIP Addresses:\r\n91.218.114[.]4\r\n5.199.167[.]188\r\n185.147.15[.]22\r\nCoverage\r\nAdvanced Malware Protection (AMP) is ideally suited to prevent the execution of the malware used by these\r\nthreat actors. Exploit Prevention present within AMP is designed to protect customers from unknown attacks such\r\nas this automatically.\r\nhttps://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nPage 4 of 5\n\nCisco Cloud Web Security (CWS) or Web Security Appliance (WSA) web scanning prevents access to malicious\r\nwebsites and detects malware used in these attacks.\r\nEmail Security can block malicious emails sent by threat actors as part of their campaign.\r\nNetwork Security appliances such as Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention\r\nSystem (NGIPS), and Meraki MX can detect malicious activity associated with this threat.\r\nAMP Threat Grid helps identify malicious binaries and build protection into all Cisco Security products.\r\nOpen Source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack\r\navailable for purchase on Snort.org.\r\nSource: https://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nhttps://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://blog.talosintelligence.com/2019/12/IR-Lessons-Maze.html"
	],
	"report_names": [
		"IR-Lessons-Maze.html"
	],
	"threat_actors": [
		{
			"id": "f27790ff-4ee0-40a5-9c84-2b523a9d3270",
			"created_at": "2022-10-25T16:07:23.341684Z",
			"updated_at": "2026-04-10T02:00:04.549917Z",
			"deleted_at": null,
			"main_name": "APT 29",
			"aliases": [
				"APT 29",
				"ATK 7",
				"Blue Dev 5",
				"BlueBravo",
				"Cloaked Ursa",
				"CloudLook",
				"Cozy Bear",
				"Dark Halo",
				"Earth Koshchei",
				"G0016",
				"Grizzly Steppe",
				"Group 100",
				"ITG11",
				"Iron Hemlock",
				"Iron Ritual",
				"Midnight Blizzard",
				"Minidionis",
				"Nobelium",
				"NobleBaron",
				"Operation Ghost",
				"Operation Office monkeys",
				"Operation StellarParticle",
				"SilverFish",
				"Solar Phoenix",
				"SolarStorm",
				"StellarParticle",
				"TEMP.Monkeys",
				"The Dukes",
				"UNC2452",
				"UNC3524",
				"Yttrium"
			],
			"source_name": "ETDA:APT 29",
			"tools": [
				"7-Zip",
				"ATI-Agent",
				"AdFind",
				"Agentemis",
				"AtNow",
				"BEATDROP",
				"BotgenStudios",
				"CEELOADER",
				"Cloud Duke",
				"CloudDuke",
				"CloudLook",
				"Cobalt Strike",
				"CobaltStrike",
				"CosmicDuke",
				"Cozer",
				"CozyBear",
				"CozyCar",
				"CozyDuke",
				"Danfuan",
				"EnvyScout",
				"EuroAPT",
				"FatDuke",
				"FoggyWeb",
				"GeminiDuke",
				"Geppei",
				"GoldFinder",
				"GoldMax",
				"GraphDrop",
				"GraphicalNeutrino",
				"GraphicalProton",
				"HAMMERTOSS",
				"HammerDuke",
				"LOLBAS",
				"LOLBins",
				"LiteDuke",
				"Living off the Land",
				"MagicWeb",
				"Mimikatz",
				"MiniDionis",
				"MiniDuke",
				"NemesisGemina",
				"NetDuke",
				"OnionDuke",
				"POSHSPY",
				"PinchDuke",
				"PolyglotDuke",
				"PowerDuke",
				"QUIETEXIT",
				"ROOTSAW",
				"RegDuke",
				"Rubeus",
				"SNOWYAMBER",
				"SPICYBEAT",
				"SUNSHUTTLE",
				"SeaDaddy",
				"SeaDask",
				"SeaDesk",
				"SeaDuke",
				"Sharp-SMBExec",
				"SharpView",
				"Sibot",
				"Solorigate",
				"SoreFang",
				"TinyBaron",
				"WINELOADER",
				"WellMail",
				"WellMess",
				"cobeacon",
				"elf.wellmess",
				"reGeorg",
				"tDiscoverer"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775433975,
	"ts_updated_at": 1775792252,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e3a4decfad0d3d3aa2ac971d4650fc15346c8c7d.pdf",
		"text": "https://archive.orkl.eu/e3a4decfad0d3d3aa2ac971d4650fc15346c8c7d.txt",
		"img": "https://archive.orkl.eu/e3a4decfad0d3d3aa2ac971d4650fc15346c8c7d.jpg"
	}
}