Conduent targeted by Maze ransomware attack
IT services provider was brought to a standstill for more than ten hours


IT services provider Conduent has revealed that it was the victim of a Maze ransomware attack on 29 May, which brought its systems to a standstill for more than ten hours.
The malicious attack successfully disrupted the firm's European operations after targeting a vulnerability in Citrix VPN appliances in the early hours of the morning. Conduent said it had managed to get most of its systems back online by 10 am, with all operations now back to normal.
"Conduent's European operations experienced a service interruption on Friday, May 29, 2020. Our system identified ransomware, which was then addressed by our cybersecurity protocols," stated a Congruent spokesman.
"This interruption began at 12.45 AM CET on May 29th with systems mostly back in production again by 10.00 AM CET that morning, and all systems have since then been restored.
Conduent said the incident resulted in a "partial interruption" to the services it provides to some of its clients and it is currently looking into its security setup.
"As our investigation continues, we have on-going internal and external security forensics and antivirus teams reviewing and monitoring our European infrastructure," the company added.
As reported by Computer Business Review, the company stopped short of naming the type of ransomware or intrusion vector involved – but the Maze ransomware group posted stolen data from Conduent to its Dark Web page.
ChannelPro Newsletter
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
Security researchers at Bad Packets believe that Conduent had been running unpatched Citrix VPNs for at least eight weeks prior to the event, despite Citrix issuing a patch on 24 January.
Attackers exploited an arbitrary code execution vulnerability known as CVE-2019-19781, which has become a common target point for ransomware groups such as Maze.
Citrix said the vulnerability was found in Citrix Application Delivery Controller (ADC) and Citrix Gateway (both formerly under the Netscaler name), which can provide attackers with an unauthenticated route in to perform arbitrary code execution. The firm advised users to upgrade vulnerable appliances as soon as possible.
Back in April, Maze also targeted IT services provider Cognizant in an attack that reports say could cost the firm anywhere between $50 and $70 million.
Dan is a freelance writer and regular contributor to ChannelPro, covering the latest news stories across the IT, technology, and channel landscapes. Topics regularly cover cloud technologies, cyber security, software and operating system guides, and the latest mergers and acquisitions.
A journalism graduate from Leeds Beckett University, he combines a passion for the written word with a keen interest in the latest technology and its influence in an increasingly connected world.
He started writing for ChannelPro back in 2016, focusing on a mixture of news and technology guides, before becoming a regular contributor to ITPro. Elsewhere, he has previously written news and features across a range of other topics, including sport, music, and general news.
-
Asus ZenScreen Fold OLED MQ17QH review
Reviews A stunning foldable 17.3in OLED display – but it's too expensive to be anything more than a thrilling tech demo
By Sasha Muller
-
How the UK MoJ achieved secure networks for prisons and offices with Palo Alto Networks
Case study Adopting zero trust is a necessity when your own users are trying to launch cyber attacks
By Rory Bathgate
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz