Accenture says it has mitigated a LockBit ransomware attack and that the attack did not impact internal or customer systems. But unconfirmed third-party reports suggest hackers could be demanding a ransomware payment from the global IT consulting firm.
Here's a timeline tracking the LockBit attack, Accenture's statement, and third-party items:
More Updates: Keep checking this blog for potential updates to the story.
How Does LockBit Ransomware Work?
Security HQ, a global MSSP, describes LockBit ransomware attack traits in this blog:
"LockBit attacks are known for their ability to encrypt Windows domains by using Active Directory group policies. Once a domain is infected, new group policies are generated by the malware and sent to devices linked to the network. Here, the policies disable the antivirus security, and implement the malware. LockBit ransomware was first observed in September 2019, since then the malware has become significantly advanced, and once ransomware ads were barred on hacking forums, a new leak site was organized to showcase their latest variant, this being LockBit 2.0."