The attack vector was an email-protection application for Microsoft 365.
A new big name has is added to the already long list of SolarWinds attack’s collateral victims: Malwarebytes.
In a recent statement, the company recognized that “while Malwarebytes does not use SolarWinds, we, like many other companies were recently targeted by the same threat actor.”
The attack methods get more advanced, while multiple companies are used as backdoors.
There are clues that indicate that the series of attacks began last spring with a corrupted software update that delivered the Sunburst backdoor to about 18.000 organizations. After that, specific targets were chosen to be infiltrated further. Thankfully, Malwarebytes noted that “we found no evidence of unauthorized access or compromise in any of our internal on-premises and production environments….We do not use Azure cloud services in our production environments.” “A thorough investigation of all Malwarebytes source code, build and delivery processes showed no evidence of unauthorized access or compromise”, they added.
Check the source.
- Most Companies Aren’t Ready For The Greatest Cyber Threat Of 2021 – RansomwareOne would think that ransomware, currently the most significant cyber threat out there, keeps all organizations on edge and […]
- Patch These 5 Vulnerabilities Now To Protect Your Company From Ransomware AttacksHackers are actively exploiting years-old security vulnerabilities to launch ransomware attacks because organizations skip on patching them. Some of […]
- Fileless And Encrypted Malware Saw Massive Growth in Q2 2021A new report analyzing malware trends in the second quarter of 2021 shows that cyber threats are becoming stealthier, […]
- Massive Phishing Attack Hits At Least 6,000 Coinbase UsersCrypto exchange Coinbase confirmed that funds were stolen from at least 6,000 accounts in a vast phishing attack this […]
- The 3 Top Ransomware Threats Might Surprise YouNo, it’s not Revil, Ragnar Locker, BlackMatter, or Conti to make it to the top three ransomware threats responsible […]