The ransomware group Maze published 6.5GB of data revealing information on the distributors’ clients, its employees, and other commercial operations. Credit: Thinkstock The group behind the Maze ransomware published a 6.5GB trove of commercial data it stole from Australian freight and logistics firm Henning Harders.Henning Harders this week confirmed that it had detected an “organized attack” on its IT systems and warned some customers that commercial data may have been accessed.However, details published by the attackers on Monday suggest a far more devastating attack that exposes not just customer data but a massive amount of financially sensitive information and employee salary information stolen from the company’s network. Additionally, what the cybercriminal group has published is just its proof that it breached Henning Hardings data, meaning the group may publish more data in future if a ransom is not paid.Maze attackers are among a few ransomware groups started threatening to publish sensitive information stolen during a ransomware attack in order to pressure victims into paying a ransom demand. Maze is also known to make huge demands. The group compromised the computers of US security personnel hiring firm Allied Universal in December and demanded the equivalent of US$2.3 million in bitcoin, as BleepingComputer reported at the time. Maze cybercriminals then published 700MB of data stolen from the company. Among two Zip archive files of Henning Harders’s data the attackers published are thousands of documents that expose the names of its corporate clients, which include major Australian and international brands, client email contact lists, annual profit and loss analysis reports, customer freight rates, salary reviews that contain the names and salaries of employees, and general operational documents. CSO Australia has seen the data but chosen not to publish specific details or name the clients.The Maze group also updated its page on Henning Harders to indicate that not just its Sydney and Melbourne offices were compromised, but that its offices in Brisbane, Perth, as well as Wellington and Auckland, New Zealand were compromised too. The cybercriminal group has also published the names of key executives. Henning Harders confirmed to CSO Australia that the customer data that was published is legitimate. “Henning Harders has become aware that the cyber attacker has started to publish some client data on an online forum controlled by it following unauthorised and illegal access to the company’s systems,” a Henning Harders spokesperson said in a statement. The company declined to say whether it had engaged in negotiations with the Maze attackers over the ransom demand or what amount the cybercriminals were asking for.“Henning Harders sincerely apologises for any inconvenience,” it said. “We treat the privacy of customer data with the utmost seriousness and this will remain our top priority until it is fully resolved. Importantly, the company remains fully operational.”Henning Harders today updated its advisory to acknowledge that the attackers had “started to publish some client and employee information on an online forum controlled by it. … All our customers and employees have been notified that some data has now been made public,” it said. Related content news Amazon debuts biometric security device, updates Detective and GuardDuty Amazon’s latest security offerings, announced at its re:Invent conference, cover everything from advanced biometrics to new tools for defeating runtime and cloud threats, including identity and access management (IAM) capabilities. By Jon Gold Nov 29, 2023 3 mins Biometrics Security Monitoring Software Threat and Vulnerability Management news Almost all developers are using AI despite security concerns, survey suggests About 96% of developers are using AI tools and nearly eight out of 10 coders are bypassing security policies to use them, while placing unfounded trust into AI’s competence and security, according to the report by Snyk. By John Mello Jr. Nov 29, 2023 4 mins Development Tools Security Practices Supply Chain news FBI probes Pennsylvanian water utility hack by pro-Iran group Federal and state investigations are underway for the recent pro-Iran hack into a Pennsylvania-based water utility targeting Israel-made equipment. By Shweta Sharma Nov 29, 2023 4 mins Cyberattacks Utilities Industry feature 3 ways to fix old, unsafe code that lingers from open-source and legacy programs Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem. By Maria Korolov Nov 29, 2023 9 mins Security Practices Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe