Conduent targeted by Maze ransomware attack
IT services provider was brought to a standstill for more than ten hours


IT services provider Conduent has revealed that it was the victim of a Maze ransomware attack on 29 May, which brought its systems to a standstill for more than ten hours.
The malicious attack successfully disrupted the firm's European operations after targeting a vulnerability in Citrix VPN appliances in the early hours of the morning. Conduent said it had managed to get most of its systems back online by 10 am, with all operations now back to normal.
"Conduent's European operations experienced a service interruption on Friday, May 29, 2020. Our system identified ransomware, which was then addressed by our cybersecurity protocols," stated a Congruent spokesman.
"This interruption began at 12.45 AM CET on May 29th with systems mostly back in production again by 10.00 AM CET that morning, and all systems have since then been restored.
Conduent said the incident resulted in a "partial interruption" to the services it provides to some of its clients and it is currently looking into its security setup.
"As our investigation continues, we have on-going internal and external security forensics and antivirus teams reviewing and monitoring our European infrastructure," the company added.
As reported by Computer Business Review, the company stopped short of naming the type of ransomware or intrusion vector involved – but the Maze ransomware group posted stolen data from Conduent to its Dark Web page.
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
Security researchers at Bad Packets believe that Conduent had been running unpatched Citrix VPNs for at least eight weeks prior to the event, despite Citrix issuing a patch on 24 January.
Attackers exploited an arbitrary code execution vulnerability known as CVE-2019-19781, which has become a common target point for ransomware groups such as Maze.
Citrix said the vulnerability was found in Citrix Application Delivery Controller (ADC) and Citrix Gateway (both formerly under the Netscaler name), which can provide attackers with an unauthenticated route in to perform arbitrary code execution. The firm advised users to upgrade vulnerable appliances as soon as possible.
Back in April, Maze also targeted IT services provider Cognizant in an attack that reports say could cost the firm anywhere between $50 and $70 million.
Dan is a freelance writer and regular contributor to ChannelPro, covering the latest news stories across the IT, technology, and channel landscapes. Topics regularly cover cloud technologies, cyber security, software and operating system guides, and the latest mergers and acquisitions.
A journalism graduate from Leeds Beckett University, he combines a passion for the written word with a keen interest in the latest technology and its influence in an increasingly connected world.
He started writing for ChannelPro back in 2016, focusing on a mixture of news and technology guides, before becoming a regular contributor to ITPro. Elsewhere, he has previously written news and features across a range of other topics, including sport, music, and general news.
-
UK to host largest European GPU cluster under £11 billion Nvidia investment plans
News Nvidia says the UK will host Europe’s largest GPU cluster, totaling 120,000 Blackwell GPUs by the end of 2026, in a major boost for the country’s sovereign compute capacity.
-
Jensen Huang says AI will make us busier – so what’s the point?
Opinion So much for efficiency gains and focusing on the more “rewarding” aspects of your job
-
Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward
News The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal.
-
Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack
News The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector
-
Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities
News The attack on IT systems supplier Miljödata has impacted public sector services across the country
-
A notorious hacker group is ramping up cloud-based ransomware attacks
News The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware.
-
Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model
News Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API.
-
Data I/O shuts down systems in wake of ransomware attack
News Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant
-
Average ransom payment doubles in a single quarter
News Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate
-
BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group
News The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos