Breaking

Accenture has been hit by LockBit Ransomware demanding 50 million

Accenture, one of the leading IT services giant have been hit by the LockBit ransomware attack. The company server multiple verticals including banks, government, technology, energy, telecommunication, healthcare, and more with an estimate of $44.3 billion business value.

How did Accenture became a victim to LockBit ransomware?

LockBit 2.0 are the criminals behind the incident and have threatened Accenture that if the ransom isn’t paid they will publish the stolen data. They have also set up a countdown for the ransom to be paid, the clock is ticking for Accenture.

Although there isn’t any proof of the stolen data, this is what the criminals had mentioned in the below statement,

 “These people are beyond privacy and security. I really hope that their services are better than what I saw as an insider. If you’re interested in buying some databases reach us,”  

The exact details of the breach and attack are yet to be uncovered, however Accenture has recovered the data from a backup as per the company’s statement.

The threat actors have claimed 6 TB of stolen files and is demanding for $50 million as ransom. The Cyble research team has conversed with the threat actors and revealed the information on the ransom demands, and as per their conversations the threat actors were able to compromise a report based on a insider.

Accenture is in the process of notifying its customers about the incident, and what’s worst is another cybercrime intelligence company called Hudson Rock have tweeted that Accenture had 2500 compromised computers that belongs to employees and partners.

LockBit isn’t a new entrant, it has been in the market for a while and have hit many other firms already, one with UK’s Merseyrail train network. Lockbit has been focused on insider’s to breach organizations, and the Australian Government had already warned about these actors.

Ransomware attacks will always disrupt your normal operations and damage your reputations and finances, please ensure you have both proactive and reactive cyber strategies to combat it.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

2 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

2 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

3 months ago