Breaking

Accenture has been hit by LockBit Ransomware demanding 50 million

Accenture, one of the leading IT services giant have been hit by the LockBit ransomware attack. The company server multiple verticals including banks, government, technology, energy, telecommunication, healthcare, and more with an estimate of $44.3 billion business value.

How did Accenture became a victim to LockBit ransomware?

LockBit 2.0 are the criminals behind the incident and have threatened Accenture that if the ransom isn’t paid they will publish the stolen data. They have also set up a countdown for the ransom to be paid, the clock is ticking for Accenture.

Although there isn’t any proof of the stolen data, this is what the criminals had mentioned in the below statement,

 “These people are beyond privacy and security. I really hope that their services are better than what I saw as an insider. If you’re interested in buying some databases reach us,”  

The exact details of the breach and attack are yet to be uncovered, however Accenture has recovered the data from a backup as per the company’s statement.

The threat actors have claimed 6 TB of stolen files and is demanding for $50 million as ransom. The Cyble research team has conversed with the threat actors and revealed the information on the ransom demands, and as per their conversations the threat actors were able to compromise a report based on a insider.

Accenture is in the process of notifying its customers about the incident, and what’s worst is another cybercrime intelligence company called Hudson Rock have tweeted that Accenture had 2500 compromised computers that belongs to employees and partners.

LockBit isn’t a new entrant, it has been in the market for a while and have hit many other firms already, one with UK’s Merseyrail train network. Lockbit has been focused on insider’s to breach organizations, and the Australian Government had already warned about these actors.

Ransomware attacks will always disrupt your normal operations and damage your reputations and finances, please ensure you have both proactive and reactive cyber strategies to combat it.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

2 days ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago