The American company Malwarebytes Security said today that he had been violated by the same group that violated the company SolarWinds last year.
Malwarebytes reported that the invasion is not related to the SolarWinds incident, as the company does not use any SolarWinds software on its internal network.
The company security ανέφερε ότι οι εισβολείς παραβίασαν τα εσωτερικά τους συστήματα εκμεταλλευόμενοι μια αδυναμία του Azure Active Directory and through vulnerable Office 365 applications.
Malwarebytes said it learned of the intrusion from the Microsoft Security Response Center (MSRC) on December 15.
At the time, Microsoft was testing the Office 365 and Azure infrastructure for malicious signs of malware. by SolarWinds hackers, also known in cyber security cycles as UNC2452 or Dark Halo.
Malwarebytes said that as soon as it learned of the breach, it launched an internal investigation to determine what hackers had access to.
"After extensive investigation, we decided that the attacker only had access to a limited subset of the company's internal emails," said Marcin Kleczynski, co-founder and current CEO of Malwarebytes.
Because the same hackers breached SolarWinds and then moved to "poison" the company's software with malware Sunburst, Kleczynski said they also conducted a very thorough audit of all of the company's products and source code looking for any signs of a breach.
"Our internal systems showed no indication of unauthorized access to any environment and production site.
"Our software remains safe to use," Kleczynski added.
Following today's revelation, Malwarebytes becomes the fourth security company breached by the UNC2452 / Dark Halo team, which US officials have linked to a Russian government spy operation.
The other companies were FireEye, Microsoft and CrowdStrike.