Sekhmet ransomware operators claim to get hit an international IT firm, Excis, “very hard.” The round reportedly occurred on may 30, and the threat actors are pressing hard to let the firm to pay an undisclosed amount of ransom. The onset was revealed yesterday on Sekhmet’s website. We are sharing a big parting of their data since their director Finn Lyskov said that we do not make any important data, so be it the threat actors wrote on their website. Their It managers are highly unprofessional and we will continue to perform attacks on this company and Mr. Kunal Amodkar will never be able to patch or hole the vulnerabilities which we exploited and appear what this company claims on their website services they provide: Securing banks and military sites Implementing security policies Firewalls site to site encryption Server security software security Infiltration testing emergency reaction in the event of a certificate transgress The threat actors also name some of the firm’s corporate clients and intimate that they will contact them to alert them that their data was compromised because it was on Excis servers “completely unprotected.” As part of their strategy, Sekhmet has made two archives of data available to the public to download — but not the passwords to those archives. They threaten to waiver the passwords tomorrow if their demands are not met. There is no indication on Excis’s site of any incident or problem. DataBreaches.net sent an inquiry to Excis last night to expect for their comment on the situation, but no reply was received as of the time of this publication. This post will live updated when a response is received.