Cybercrime

Accenture Confirms Data Stolen in Ransomware Attack

Consulting giant Accenture has confirmed that proprietary information was stolen in a ransomware attack disclosed in August 2021.

<p><span style="font-family: trebuchet ms, geneva;"><span><strong>Consulting giant Accenture has confirmed that proprietary information was stolen in a <a href="https://www.securityweek.com/ransomware-gang-leaks-files-allegedly-stolen-accenture" target="_blank" rel="noopener">ransomware attack disclosed in August 2021</a>.</strong></span></span></p>

Consulting giant Accenture has confirmed that proprietary information was stolen in a ransomware attack disclosed in August 2021.

At the time, LockBit ransomware operators claimed to have stolen over 6 terabytes of data from Accenture’s systems, demanding a $50 million ransom to be paid in exchange for keeping the data private.

Given that Accenture did not pay the requested amount in due time, the attackers published over 2,000 files allegedly stolen during the incident, threatening to publish more of them.

Accenture said at the time that it was able to quickly contain the incident and restore affected systems from backups, but did not provide specific details on the type of data that was stolen.

In a Form 10-K filing with the Securities and Exchange Commission (SEC) last week, the company confirmed that the attackers were able to steal some proprietary information from its servers.

“As previously reported, during the fourth quarter of fiscal 2021, we identified irregular activity in one of our environments, which included the extraction of proprietary information by a third party, some of which was made available to the public by the third party,” the company said.

Accenture also notes that incidents such as unauthorized access to its systems, data theft, and breaches involving client systems enabled by or provided by the company haven’t had a material impact on operations, although a financial impact is expected.

It’s yet unclear what type of data the attackers were able to steal from Accenture. However, the company does not appear to have sent out breach notifications to alert of personally identifiable information being compromised.

Advertisement. Scroll to continue reading.

Related: VirusTotal Shares Analysis of 80 Million Ransomware Samples

Related: Ransomware Hit SCADA Systems at 3 Water Facilities in U.S.

Related: Colonial Pipeline Confirms Personal Information Impacted in Ransomware Attack

Related Content

ICS/OT

UK’s NCSC releases security guidance for OT organizations considering migrating their SCADA solutions to the cloud.

ICS/OT

In an age of increasing geopolitical tensions caused by actual wars, and the threat of Chinese action against Taiwan, OT is a target that...

ICS/OT

SecurityWeek interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.

ICS/OT

Seven vulnerabilities found in Rapid SCADA could be exploited to gain access to sensitive industrial systems, but they remain unpatched.

ICS/OT

The Municipal Water Authority of Aliquippa was just one of multiple organizations breached in the U.S. by Iran-linked "Cyber Av3ngers" hackers

ICS/OT

Members of Congress asked the U.S. Justice Department to investigate how foreign hackers breached a water authority near Pittsburgh, prompting CISA to warn other...

ICS/OT

SecurityWeek’s 2023 ICS Cybersecurity Conference continues in Atlanta, as hundreds of industrial cybersecurity stakeholders gather for Day 2 of the annual industrial cybersecurity conference.

ICS/OT

Join SecurityWeek and TXOne Networks for this webinar as we expose common misconceptions surrounding the security of Operational Technology (OT) and dive into the...

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version