Predict your next investment

See what CB Insights has to offer

About Maze

Maze is a new retail sales channel, providing direct exposure to increasingly mobile-enabled shoppers. It combines loyalty rewards, customer referrals, bookings, prepayments and coupon deals into a single app. Maze helps small-medium retail businesses acquire and retain customers, sell more to them – while improving productivity and minimising operational costs.Why MazeThe prevalent approach in customer acquisition and retention is combining a number of electronic and paper-based media – daily deals, Shop-A-Dockets, loyalty cards, web and social. While a significant cost to the business ($500-$1000/month), this plethora of disjoint channels also makes it tedious for shoppers to engage with the retailer - requiring multiple apps, cards and shopping dockets to take advantage of the opportunities around them.

Maze Headquarter Location

Latest Maze News

Media Alert: Three Strikes, and Maze Was Out

Sep 17, 2020

| Source: Sophos Ltd. OXFORD, U.K., Sept. 17, 2020 (GLOBE NEWSWIRE) -- Sophos , a global leader in next-generation cybersecurity, today published a report, “ Maze Attackers Adopt Ragnar Locker Virtual Machine Technique ,” which shows how attackers tried three different ways to execute Maze ransomware during a single attack while demanding a $15 million ransom. On the third try, the Maze operators attempted to leverage virtual machines (VM) to spread the ransomware, a technique pioneered by Ragnar Locker , as reported by Sophos in May 2020. Maze is one of the most notorious ransomware families, active since 2019 when it evolved from ChaCha ransomware, and it was among the first to combine data encryption with information theft. How Maze’s Attack Attempts Unfolded The investigation revealed that the attackers had penetrated the network at least six days before their first attempt to launch the ransomware payload. During this time, the attackers explored the network, ran legitimate third party tools, established connections, and exfiltrated data to a cloud storage service to prepare for the release of the ransomware component. Upon launching the first ransomware attack, the operators demanded a $15 million ransom from the target of the attack. The target did not pay the ransom. When the attackers realized the first attack had failed, they launched a second, slightly different attempt. This was intercepted by security tools and the Sophos Managed Threat Response (MTR) team that was handling the incident response efforts. For the third attempt, the attackers used a reconfigured version of Ragnar Locker’s VM technique, this time running Windows 7 instead of Ragnar Locker’s Windows XP VM, and targeted just one file server. The attack and the Ragnar Locker technique were immediately recognized and blocked. “The attack chain uncovered by Sophos threat responders highlights the agility of human adversaries and their ability to quickly substitute and reconfigure tools and return to the ring for another round,” said Peter Mackenzie, incident response manager, Sophos. “The use of a noisy Ragnar Locker virtual machine technique, with its big foot-print and CPU usage, could reflect a growing frustration on the part of the attackers after their first two attempts to encrypt data failed.” Steps to Prevent Cyberattacks Sophos recommends that to prevent cyberattacks, particularly ransomware, IT security teams need to reduce the attack surface by updating to cloud-based, layered security systems, including anti-ransomware technology, educate employees on what to look out for, and consider setting up or engaging a human threat hunting service to spot clues an active attack is underway. “Every organization is a target, and any spam or phishing email, exposed RDP port, vulnerable exploitable gateway device or stolen remote access credentials provides enough of an entry point for adversaries to gain a foothold,” said Mackenzie. For additional information and the full article, please reference SophosLabs Uncut . Additional Resources About Sophos As a worldwide leader in next-generation cybersecurity, Sophos protects more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyber threats. Powered by SophosLabs – a global threat intelligence and data science team – Sophos’ cloud-native and AI-powered solutions secure endpoints (laptops, servers and mobile devices) and networks against evolving cyberattack techniques, including ransomware, malware, exploits, data exfiltration, active-adversary breaches, phishing, and more. Sophos Central, a cloud-native management platform, integrates Sophos’ entire portfolio of next-generation products, including the Intercept X endpoint solution and the XG next-generation firewall, into a single “synchronized security” system accessible through a set of APIs. Sophos has been driving a transition to next-generation cybersecurity, leveraging advanced capabilities in cloud, machine learning, APIs, automation, managed threat response, and more, to deliver enterprise-grade protection to any size organization. Sophos sells its products and services exclusively through a global channel of more than 53,000 partners and managed service providers (MSPs). Sophos also makes its innovative commercial technologies available to consumers via Sophos Home. The company is headquartered in Oxford, U.K. More information is available at www.sophos.com . Press Contact:

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Maze Patents

Maze has filed 6 patents.

The 3 most popular patent topics include:

  • Composting
  • Organic gardening
  • Sanitation
patents chart

Application Date

Grant Date

Title

Related Topics

Status

5/1/2017

9/10/2019

Sanitation, Composting, Sewerage, Technical drawing, Organic gardening

Grant

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

00/00/0000

00/00/0000

Subscribe to see more

Subscribe to see more

Subscribe to see more

Application Date

5/1/2017

00/00/0000

00/00/0000

00/00/0000

00/00/0000

Grant Date

9/10/2019

00/00/0000

00/00/0000

00/00/0000

00/00/0000

Title

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Related Topics

Sanitation, Composting, Sewerage, Technical drawing, Organic gardening

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

Status

Grant

Subscribe to see more

Subscribe to see more

Subscribe to see more

Subscribe to see more

CB Insights uses Cookies

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.