Ransomware Criminals Claim To Have Stolen Deloitte's Data

A ransomware group which focuses uses phishing and spear phishing exploits, known as Brain Cipher, claims to have stolen 1TB of data from Deloitte, the leading multinational firm.

Deloitte have responded that, while they aware of the claims made by the threat actor, their network systems have not been affected.

Deloitte operate a multinational professional services network, one of the so-called “big four” accounting and audit firms, and include Cyber Risk in their range of services.

Brain Cipher has listed the Deloitte UK affiliate on its victim site on the Dark Web and claims to have stolen more than 1TB of compressed data, including countdown timer with their post which gives the company less than 11 days to react. It has until December 15th, 2024.

“Unfortunately, giant companies do not always do their job well,” Brain Cypher claim. They also say that Deloitte did not observe “elementary points” of information security and threatens to release more information about the incident, data samples, and others. “We will show excellent (not) monitoring work, and tell what tools we used, and use there today,” the gang said on the Dark Web. 

According to SentinelOne, Brain Cipher targets multiple critical industries and governmental organisations and engages in multi-pronged extortion. It posts victims on its TOR-based data leak site, and its malicious payloads are based on LockBit, a threat group which has now been dissolved by international law enforcement.

It is though that that Brain Cipher's claim relates to a single client’s system which sits outside of the Deloitte network. 

SentinelOne  |    Sangfor   |     Cybernews   |   Infosecurity Magazine   |   Computing   |    SCMagazine   | 

CyberDaily    

Image: @DeloitteUK

You Might Also Read: 

Ransomware Attack On Accenture:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« British NHS Hospitals Under Attack
FBI & CISA Advice - Use Encrypted Messaging »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

LinOTP

LinOTP

LinOTP is an enterprise level, innovative, flexible and versatile OTP-platform for strong authentication.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory (AML)

Applied Magnetics Laboratory is a manufacturer of military security and data destruction equipment for sensitive, classified, and secret information.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

V2X

V2X

V2X delivers IT support, networking, and cybersecurity solutions that ensure optimal mission support and performance.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Codacy

Codacy

Codacy is a developer-first, API-driven platform that provides a curated collection of best-in-class code analysis, security, coverage, and engineering performance tools.

Cyber Compliance Watch

Cyber Compliance Watch

Free index and notification of main new cyber security publications (standards and regulations) from agencies and regulators.