The Nova ransomware group has listed KPMG Netherlands on its data leak site, claiming to have successfully breached the professional services giant on January 23, 2026. The attackers allege they have exfiltrated sensitive data and have initiated a ten-day countdown for the firm to make contact and pay a ransom. This incident follows a well-established pattern of "double extortion," where threat actors both encrypt a victim's files and steal sensitive data to use as leverage. An attack on a major professional services firm like KPMG is highly significant, as it could expose confidential data belonging to a multitude of corporate clients.
As of this report, KPMG has not issued a public statement confirming or denying the breach. The information comes from third-party services that monitor ransomware leak sites.
While specific details of the intrusion vector are unknown, ransomware groups like Nova typically gain initial access through common methods:
Once inside the network, the attackers would have performed reconnaissance, escalated privileges, and moved laterally to identify and access high-value data repositories. After exfiltrating the data to their own servers, they would have deployed the Nova ransomware payload to encrypt files across the network, causing business disruption.
An attack on a firm like KPMG has cascading impacts:
KPMG's internal security team is likely engaged in a full-scale incident response. For other organizations, this incident is a reminder of key detection strategies for ransomware:
Monitor for Data Exfiltration: Use Data Loss Prevention (DLP) tools and network traffic analysis to detect large, anomalous outbound data transfers, which often precede the encryption phase of a ransomware attack.
Endpoint Detection and Response (EDR): EDR tools can detect ransomware behaviors, such as rapid file modification/encryption, deletion of volume shadow copies (vssadmin.exe delete shadows), and the execution of suspicious PowerShell commands.
Active Directory Monitoring: Monitor for unusual activity in Active Directory, such as the creation of new admin accounts or mass changes to group policies, which are often precursors to a domain-wide ransomware deployment.
Standard ransomware mitigations are critical for defending against groups like Nova:
Immutable Backups: Maintain offline, encrypted, and immutable backups of critical data. The 3-2-1 backup rule (3 copies, 2 different media, 1 offsite) is essential.
Network Segmentation: Segment the network to prevent attackers from moving laterally. Critical data servers should be in isolated network zones with strict access controls.
Patch Management: Aggressively patch all internet-facing systems and critical internal servers to close the vulnerabilities that ransomware groups exploit for initial access.
Multi-Factor Authentication (MFA): Enforce MFA on all remote access solutions (VPNs, RDP) and for all privileged accounts to protect against credential theft.
Maintaining offline, immutable backups is the most critical defense for recovering from a ransomware attack without paying the ransom.
Modern EDR and antivirus solutions can detect and block ransomware execution based on signatures and behavioral analysis.
Proper network segmentation can contain a ransomware outbreak, preventing it from spreading from the initial point of compromise to critical servers and backups.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats