{
	"id": "f7ba5fe3-ea8e-4056-9e2d-ab7e65bcd162",
	"created_at": "2026-04-06T00:17:28.470373Z",
	"updated_at": "2026-04-10T03:20:03.971031Z",
	"deleted_at": null,
	"sha1_hash": "fc0a35b859fb85f352fc8961b301e5e32b3fca2a",
	"title": "Chipmaker MaxLinear reports data breach after Maze Ransomware attack",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 752839,
	"plain_text": "Chipmaker MaxLinear reports data breach after Maze Ransomware\r\nattack\r\nBy Sergiu Gatlan\r\nPublished: 2020-06-16 · Archived: 2026-04-02 11:27:12 UTC\r\nU.S. system-on-chip (SOC) maker company MaxLinear disclosed that some of its computing systems were encrypted by\r\nMaze Ransomware operators last month, after an initial breach that took place around April 15.\r\nMaxLinear is a New York Stock Exchange-traded company and a provider of RF, analog, and mixed-signal integrated\r\ncircuits for connected home, industrial, and infrastructure applications.\r\nIn April 2020, MaxLinear announced net revenue of $62 million for the first quarter of 2020, and its CEO, Kishore\r\nSeendripu, shared plans to \"acquire Intel’s Home Gateway Platform Division in the third quarter of this year.\"\r\nhttps://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/\r\nPage 1 of 4\n\nhttps://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\nData breach reported after stolen data leaked online\r\nIn a data breach notification sent to affected individuals on June 10 and seen by BleepingComputer, MaxLinear states that\r\nthe attack was discovered on May 24.\r\n\"We immediately took all systems offline, retained third-party cybersecurity experts to aid in our investigation, contacted\r\nlaw enforcement, and worked to safely restore systems in a manner that protected the security of information on our\r\nsystems,\" the letter reads.\r\n\"Our investigation to-date has identified evidence of unauthorized access to our systems from approximately April 15, 2020,\r\nuntil May 24, 2020.\"\r\nMaxLinear says that it was able to restore some of the systems affected during the attack and its IT staff is still working on\r\nbringing back up the rest.\r\nOn June 15, Maze Ransomware leaked 10.3GB of accounting and financial information out of the over 1TB of data\r\nallegedly stolen before encrypting MaxLinear's systems.\r\nData leaked by Maze Ransomware\r\nPersonal and financial info exposed\r\nThe SOC maker says that this leaked information could include personally identifiable (PII) and financial information such\r\nas \"name, personal and company email address and personal mailing address, employee ID number, driver’s license number,\r\nfinancial account number, Social Security number, date of birth, work location, compensation and benefit information,\r\ndependent, and date of employment.\"\r\nThe company also states that the incident has led to an enterprise-wide password reset and that the breach was disclosed to\r\nthe appropriate law enforcement authorities.\r\nhttps://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/\r\nPage 3 of 4\n\nAccording to documents filed with the U.S. Securities and Exchange Commission (SEC) on June 16, as discovered by\r\nReuters, the attack did not affect shipment, order fulfillment, and production capabilities, and MaxLinear doesn't plan to pay\r\nthe ransom Maze Ransomware requested to stop leaking the stolen data.\r\nThe chipmaker said in the SEC filing that, although the company would incur extra costs due to the forensic investigation\r\nand systems remediation following the attack, it does not anticipate \"that the incident will materially or adversely affect our\r\noperating expenses.\"\r\n\"We carry cybersecurity insurance, subject to applicable deductibles and policy limits,\" MaxLinear said.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/\r\nhttps://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack/"
	],
	"report_names": [
		"chipmaker-maxlinear-reports-data-breach-after-maze-ransomware-attack"
	],
	"threat_actors": [],
	"ts_created_at": 1775434648,
	"ts_updated_at": 1775791203,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/fc0a35b859fb85f352fc8961b301e5e32b3fca2a.pdf",
		"text": "https://archive.orkl.eu/fc0a35b859fb85f352fc8961b301e5e32b3fca2a.txt",
		"img": "https://archive.orkl.eu/fc0a35b859fb85f352fc8961b301e5e32b3fca2a.jpg"
	}
}