Trending

Maze Ransomware Operators release the Banco de Costa Rica data LEAK part 2

Recently, the Maze ransomware operators released the second part of the data leak of Banco De Costa, one of the strongest state-owned commercial banks that operate in Costa Rica. 

The Banco de Costa Rica was being established on 20 April 1877. Banco de Costa Rica (BCR) is a state-owned commercial bank that operates in Costa Rica. With equity of $806,606,710 and assets of $7,607,483,881, the bank has established itself as one of the strongest banking companies in both Costa Rica and Central America. The bank began primarily as a private commercial bank until it was designated a currency issuer and exclusive manager of public revenues in the last decade of the 19th century. After the bank nationalization decree of 1948, Banco de Costa Rica became a financial entity with a major role in the development of the country. 

Once again, the Cyble Research Team has verified the data leak, which consists of an excel file detailing the entire network structure of Banco BCR. As per Cyble’s researchers, the Maze ransomware operators have made this data leak due to the Banco de Costa not taking the previous leak seriously. Along with that, the Maze ransomware operators have threatened the BCR that soon they would be publishing the Banco BCR processing information. Below is the snapshot of the press release being posted by the Maze ransomware operators-:

Here are some snapshots of the information about the network structure of Banco BCR being leaked by the Maze ransomware operators-:

Snapshot Detailing Information of VM’s of BCR

A picture containing building, door, computer

Description automatically generated

Snapshot Detailing Information of Multiple Hosts of BCR

report-ad-banner

Snapshot Detailing Various IP Addresses and MAC Addresses

About Cyble:

Cyble Inc.’s mission is to provide organizations with a real-time view of their supply chain cyber threats and risks. Their SaaS-based solution powered by machine learning and human analysis provides organizations’ insights to cyber threats introduced by suppliers and enables them to respond to them faster and more efficiently.

Cyble strives to be a reliable partner/facilitator to its clients allowing them with unprecedented security scoring of suppliers through cyber intelligence sourced from open and closed channels such as OSINT, the dark web and deep web monitoring and passive scanning of internet presence. Furthermore, the intelligence clubbed with machine learning capabilities fused with human analysis also allows clients to gain real-time cyber threat intel and help build better and stronger resilience to cyber breaches and hacks. Due to the nature of the collected data, the company also offer threat intelligence capabilities out-of-box to their subscribers.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading