Sequrics Cybersecurity Services

Sequrics Cybersecurity Services

Unified Security Resilience
Analyze, Strategize, Operationalize

(415) 964-0311
Email: contact@sequrics.com

Sequrics
San Jose, CA

Questions? Call: (415) 964-0311
  • Home
  • Services
    • Cybersecurity Assessment
    • Cybersecurity Assurance
    • DevSecOps Consulting
    • Cybersecurity Industrial
  • CISO Services
  • Genie360
  • Staffing
  • Resources
  • About Us
    • Profile
    • Industry Verticals served
    • Certifications
    • Testimonials
    • FAQ
  • Careers
  • Sitemap
Contact
Us
  • Home
  • Resources
  • Uncategorized
  • Ransomware Group Demanding $50M In Accenture Security Breach: Cyber Firm
July 1, 2025

Ransomware Group Demanding $50M In Accenture Security Breach: Cyber Firm

0
Ezhil
Friday, 13 August 2021 / Published in Uncategorized

Ransomware Group Demanding $50M In Accenture Security Breach: Cyber Firm

The hacker group behind a ransomware attack on global solution provider giant Accenture has made a ransom demand for $50 million, according to a cybersecurity firm that reports seeing the demand.

The threat actor is demanding the $50 million in exchange for more than 6 TB of data, according to a tweet from Cyble, a dark web and cybercrime monitoring firm.

On Thursday, Accenture said it did not have any updates to its statement—and referred CRN to a statement provided on Wednesday saying that it “contained the matter and isolated the affected servers” and that “there was no impact on Accenture’s operations, or on our clients’ systems.”

In the attack disclosed on Wednesday, the hacker group reportedly used LockBit ransomware to target Accenture, which is No. 1 on CRN’s Solution Provider 500 for 2021. LockBit, according to New Zealand-based cybersecurity company Emsisoft, is a strain of ransomware that prevents users from accessing infected systems until a ransom payment is made.

The incident follows the July attack on Kaseya by ransomware operator REvil, which included a $70 million demand to decrypt victim files. Kaseya later said it obtained a REvil ransomware decryptor, but did not pay the ransom.

  • Tweet

What you can read next

Sequrics
pegasus

Featured Posts

  • Sequrics

    pegasus

    2 comments
  • Hello world!

    1 comments
  • Progressively repurpose cutting-edge models

    0 comments
  • Enthusiastically administrate ubiquitous

    0 comments
  • Uniquely productize next-generation opportunities

    0 comments

Recent Comments

  • bindra on pegasus
  • rkb on pegasus
  • bindra on Hello world!
  • A WordPress Commenter on Default Kit

Archives

  • August 2021
  • March 2021
  • August 2015

Categories

  • Mobile
  • Networking
  • Technology
  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Contact Us!

Please fill this form and we'll get back to you as soon as possible!

  • GET SOCIAL

© 2024 Sequrics. All Rights Reserved. San Jose, CA

TOP