CRN
  • Home
  • News
  • Security

Accenture knew about ransomware attack in late July: report

By Kyle Alspach on Aug 13, 2021 10:52AM
Accenture knew about ransomware attack in late July: report

In The Spotlight

Partners join Ingram Micro, Vertiv for cooking lessons

Meet the Customer Experience finalists in the 2022 CRN Impact Awards

Meet the Business Transformation finalists in the 2022 CRN Impact Awards

Meet the Workforce Empowerment finalists in the 2022 CRN Impact Awards

Accenture spotted the LockBit ransomware attack on its systems as far back as July 30 and found that hackers had stolen documents referencing clients, as well as work materials created on clients’ behalf, according to a report from cybersecurity news site CyberScoop.

The publicly traded IT consultancy initially confirmed the ransomware attack on Wednesday in the US after CNBC reporter Eamon Javers tweeted about the incident.

In a statement Wednesday, Accenture said that it had “immediately contained the matter and isolated the affected servers” and that “there was no impact on Accenture’s operations, or on our clients’ systems.” The statement did not reference when Accenture had originally learned of the ransomware attack.

CyberScoop cited an internal memo in reporting that Accenture had discovered the breach in late July, nearly two weeks before the solution provider giant publicly confirmed the ransomware attack.

The documents stolen by hackers referenced a “small number” of clients, but “none of the information is of a highly sensitive nature,” the internal Accenture memo said, according to CyberScoop’s report.

Accenture did not immediately respond to a request for comment on the CyberScoop report Thursday.

On its website, Accenture reports that its client base covers “the full range of industries around the world” and includes 91 companies in the the Fortune Global 100, along with more than three-fourths of the companies in the Fortune Global 500.

The hacker group behind the Accenture attack—which is known as LockBit 2.0, according to CyberScoop and other media outlets—reportedly used LockBit ransomware to target Accenture’s systems. The group has demanded $50 million from Accenture in exchange for 6 TB of data, according to Cyble, a dark web and cybercrime monitoring firm. Accenture has not confirmed the ransom demand.

LockBit encrypts files using AES encryption and prevents users from accessing infected systems until a ransom payment is made, according to New Zealand-based cybersecurity company Emsisoft. The LockBit ransomware uses processes that are largely automated, making it “one of the most efficient ransomware variants on the market,” Emsisoft wrote in a blog post.

In its statement Wednesday, Accenture said that “through our security controls and protocols, we identified irregular activity in one of our environments.” After containing the incident and isolating impacted servers, “we fully restored our affected servers from back up,” Accenture said.

VX-Underground, which claims to have the Internet’s largest collection of malware source code, on Wednesday tweeted a timer supposedly from the hacker group showing the amount of time before the attack on Accenture’s data would start. The time on the timer eventually passed.

VX-Underground tweeted that the LockBit ransomware group released 2,384 files for a brief time, but those files were inaccessible because of TOR domain outages probably due to the high traffic. The organization said there was more to come as the LockBit attack clock was restarted with a new time, but that time has now passed as well.

Ultimately, IT service providers need to ensure that their own systems are secure in order to remain credible in recommending security measures for their own customers, said Douglas Grosfield, founder and CEO of Kitchener, Ontario-based Five Nines IT Solutions, in an interview with CRN.

“If you’re not well protected, then you’re not well positioned to be able to protect others,” he said.

More than one third of all organizations globally have experienced a ransomware incident over the past 12 months, according to research firm IDC, which disclosed the findings from a new survey on ransomware attacks on Thursday.

In a July attack on IT management software firm Kaseya, ransomware operator REvil demanded $70 million demand to decrypt victim files. Kaseya later said it obtained a decryptor for the ransomware, but did not pay the ransom.

This article originally appeared at crn.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © 2018 The Channel Company, LLC. All rights reserved.
Tags:
accenture ransomware security

Partner Content

How Yealink powers the Future Workplace with Microsoft Teams collaboration devices
Promoted Content
How Yealink powers the Future Workplace with Microsoft Teams collaboration devices
Shure keen to upgrade conference room audio as staff head back to the office
Promoted Content
Shure keen to upgrade conference room audio as staff head back to the office
How to prepare for the increasing demand for cloud-ready partners
Promoted Content
How to prepare for the increasing demand for cloud-ready partners
In the low-latency cloud era, connectivity makes all the difference
Promoted Content
In the low-latency cloud era, connectivity makes all the difference
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel
Promoted Content
Microsoft, Yealink and Alloy’s roadshows fire up the Australian channel

Sponsored Whitepapers

How vulnerability scans identify & protect against cyberthreats before criminals locate them
How vulnerability scans identify & protect against cyberthreats before criminals locate them
Monitoring & automation: A primer for MSPs
Monitoring & automation: A primer for MSPs
Endpoint Detection and Response
Endpoint Detection and Response
How to put your infrastructure into overdrive
How to put your infrastructure into overdrive
MSPs: Stack your solutions
MSPs: Stack your solutions
By Kyle Alspach
Aug 13 2021
10:52AM
0 Comments

Related Articles

  • Ransomware protection has become a critical channel upsell
  • Nvidia employee, company information leaks online
  • QLD Govt-owned energy company attack claimed by Russian-speaking gang
  • Cohesity announces two ransomware security offerings
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Bidding war for MOQ Limited heats up

Bidding war for MOQ Limited heats up

Servers Australia discloses "malicious activity" impacting some Sydney services

Servers Australia discloses "malicious activity" impacting some Sydney services

Global SIs top Gartner's cloud IT transformation providers report

Global SIs top Gartner's cloud IT transformation providers report

Reserve Bank of Australia launches digital currency project

Reserve Bank of Australia launches digital currency project

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.