Trending

HomeBlog
Several Well-Known Organisations Being Targeted by MAze Ransomware Operators – Data Leak

Several Well-Known Organisations Being Targeted by MAze Ransomware Operators – Data Leak

Recently Maze ransomware operators, who are one of the well-known ransomware groups targeted a bunch of well-established organisations and leaked their confidential data on their website.

Previously the Cyble Research Team verified and reported the data leak of Kerr Controls Limitedbeing made by the Maze ransomware group. But in this instance, the ransomware group leaked highly sensitive data and documents of GCL System Integration Technology Co., Ltd, Faxon Machining Inc, and Bossini Enterprises Limited. Talking about these organisations, GCL System Integration Technology Co., Ltd is part of GOLDEN CONCORD Group (GCL) which is an international energy company specializing in clean and sustainable power production. The group founded in 1990 now employees over 25,000 people. Founded in 1978, Faxon Machining began in a small 4,500 square foot building as a family run business with a vision for the future. Now nearly after 30 years, their humble beginnings have evolved into their current 80,000 square foot state-of-art manufacturing facility offering the latest in machining technologies and services. Lastly, Bossini International Holdings Limited, listed on the stock exchange of Hong Kong limited in 1993 (stock code: 592), together with its subsidiaries (“bossini”) is a leading apparel brand owner, retailer, and franchiser in the region. Headquartered in Hong Kong, Bossini launched its first retail outlet in 1987.

Below are the snapshots of the messages posted by the Maze ransomware operators on their website.

The Cyble Research Team has identified and verified the data leak. The data leak includes multiple sensitive data such as NDAs, scanned copies of cheques, Insurance documents, Sale and Purchase memos, and much more. Below are the snapshots of some of the leaked data of the organisations published online.

Snapshot of Non-Disclosure Agreement

About Cyble:

Cyble is a US-based cyber threat intelligence company with the express mission to provide organizations with real-time views of their supply chain cyber threats and risks.

report-ad-banner

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading