The American company better safetys Malwarebytes said today that he had been violated by the same group that violated the company SolarWinds last year.
Malwarebytes reported that the invasion is not related to the SolarWinds incident, as the company does not use any SolarWinds software on its internal network.
The security firm said attackers breached their internal systems by exploiting a weakness in Azure Active Directory and through vulnerable applications of Office 365.
Malwarebytes reported that they learned about the intrusion from Microsoft Security Response Center (MSRC) στις 15 Δεκεμβρίου.
At the time, Microsoft was testing the Office 365 and Azure infrastructure for malicious signs of malware. by SolarWinds hackers, also known in cyber security cycles as UNC2452 or Dark Halo.
Malwarebytes said that as soon as it learned of the breach, it launched an internal investigation to determine what hackers had access to.
"After extensive investigation, we decided that the attacker only had access to a limited subset of the company's internal emails," said Marcin Kleczynski, co-founder and current CEO of Malwarebytes.
Because the hackers themselves broke into SolarWinds and then moved to "poison" the company's software with Sunburst malware, Kleczynski said they also carried out a very thorough check of all the company's products and source code by searching the company. any signs of violation.
"Our internal systems showed no indication of unauthorized access to any environment and production site.
"Our software remains safe to use," Kleczynski added.
Following today's revelation, Malwarebytes becomes the fourth security company breached by the UNC2452 / Dark Halo team, which US officials have linked to a Russian government spy operation.
The other companies were FireEye, Microsoft and CrowdStrike.