SoftServe ransomware victim

Ukrainian software company and IT service provider SoftServe was attacked by ransomware on September 1, which may have led to the theft of their customers' source code.

With more than 8.000 employees and 50 offices worldwide, SoftServe is one of the largest companies in Ukraine offering software development and IT consulting services.

News of a cyber attack on SoftServe first surfaced on the Telegram DС8044 Kyiv Info channel, where an alleged message was sent by the company to its employees.

"Today at 1 p.m. SoftServe was attacked. The hackers have access to the company's infrastructure and managed to start ransomeware encryption along with some other malware. "

In a later statement on a Ukrainian technology news page, SoftServe confirmed that an attack had taken place, prompting them to disconnect their customers to prevent it from spreading.

"Yes, there was an attack today. The most important consequences of the attack are the temporary loss of functionality of a part of the mail system and the interruption of some of the auxiliary test environments. "As far as we can tell, this is the biggest impact of the attack and the other systems or customer data were not affected."

  CryptoDrop The first effective anti-ransomware is a fact

"In order to prevent the spread of the attack, we have isolated certain parts of our network and restricted communication with customer networks. We prepare a message to our customers about the situation. At the same time as resuming services, we are investigating the incident itself, so we are not prepared to comment on who exactly did it. " said Adrian Pavlicevic, Senior Vice President of Informatics at SoftServe.

According to the SoftService incident, the attackers exploited a DLL vulnerability that violated the legal application Rainmeter to develop their ransomware.

Rainmeter is a legitimate Windows customization tool that loads a Rainmeter.dll at startup.

During the attack, hackers replaced the legal Rainmeter.dll with a malicious version written from the source code of the application.

According to her scouts VirusTotal, Rainmeter.dll is recognized as Win32 / PyXie.A.

In one reference of BlackBerry since 2019, PyXie is a Python Remote Access (RAT) trojan known to exploit malicious DLL vulnerabilities in other software such as LogMeIn and Google Update.

  Damaged ATM rains dollars out of a bank in the US

BlackBerry researchers say they have seen evidence that this RAT has been used in ransomware attacks.

Registration in via email

Your email for sending each new post

Follow us on Google News at Google news

Leave a reply

Your email address Will not be published.

9 + 1 =  

Previous Story

MoodleMoot Greece-Cyprus 2020 Call for submissions

Next Story

KeePass 2.46 has released a new update