SolarWinds Attackers successfully strike Malwarebytes

by | January 21, 2021 | Cybersecurity News

The attack vector was an email-protection application for Microsoft 365.

A new big name has is added to the already long list of SolarWinds attack’s collateral victims: Malwarebytes.

In a recent statement, the company recognized that “while Malwarebytes does not use SolarWinds, we, like many other companies were recently targeted by the same threat actor.”

The attack methods get more advanced, while multiple companies are used as backdoors.

There are clues that indicate that the series of attacks began last spring with a corrupted software update that delivered the Sunburst backdoor to about 18.000 organizations. After that, specific targets were chosen to be infiltrated further. Thankfully, Malwarebytes noted that “we found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments….We do not use Azure cloud services in our production environments.” “A thorough investigation of all Malwarebytes source code, build and delivery processes showed no evidence of unauthorized access or compromise”, they added.

Check the source.


Read More

by Dan Florian

Product owner and co-founder of ATTACK Simulator. Dan likes to code, is passionate about design, and loves running and swimming.

There’s no reason to postpone training your employees

Get a quote based on your organization’s needs and start building a strong cyber security infrastructure today.