At the time when the attackers made the claim, Emsisoft's ransomware threat researcher Brett Callow questioned whether they really had done what they claimed, adding that the group was a "bunch of lowlifes", adding that lowlifes were not known for their honesty.
At the time they made the claim, the attackers published screenshots (below) of files that appeared to be from a Python code repository.
A second screenshot (below) showed an archive file with a .KDZ extension, which is known to be a file extension for official stock firmware from LG.
File names indicated that the .KDZ files were from firmware for AT&T devices that were built for the American market. AT&T lists 41 LG devices on its website, all of which are available on the telco's subscriber plans.
iTWire has contacted LG Electronics for comment.
A screenshot showing part of the data dumped on the dark Web by the attackers who hit LG Electronics.
Contacted for his take, Callow said: "Interestingly, the criminals claim to have elected not to encrypt LG's data and only exfiltrate proprietary information during the attack. Whether this is true or whether the attack was detected and blocked prior to the ransomware being deployed is impossible to say.
"Whatever the case, it nonetheless indicates that 'ransomware attack' is now an overly simplistic term for incidents which have evolved to include intrusion and exfiltration, but not necessarily encryption."
Callow pointed out that in an email in June, the Maze gang told the American technology news website ZDNet that they did not execute their ransomware on LG's network, but merely stole the company's proprietary data and chose to skip to the second phase of their extortion attempts.
He said the gang had told the site, via a contact form on their leak site, "We decided not to execute [the] Maze [ransomware] because their clients are socially significant and we do not want to create disruption for their operations, so we only have exfiltrated the data."