Malwarebytes was struck by the same lighting that attacked SolarWinds's system in 2020, being one of the most scandalous hacks in the past year that affected several of the United States' government who were clients. There is no mention of the Russians taking part in the recent hack to Malwarebytes, but SolarWinds who initially suffered the attack was taken by the "Cozy Bear."
The popular anti-malware security software and multiplatform application, Malwarebytes, recently revealed that they have been attacked by an application created by the same attackers that targeted SolarWinds in 2020. The attack is known to be the Russian APT29 (advanced persistent threat) "Cozy Bear" and its creators, now dubbed as "Dark Halo" or UNC2452.
The notorious hack upon SolarWinds last year has alerted the country's departments, as it were the company's top-class clients, with several branches of the government including Treasury, Defense, Homeland Security, etc. The Orion platform suffered one of the most painful hacks of all time, effectively rendering the system vulnerable on its update where hackers saw an opportunity.
Read Also: 'Battlefront 2' Crossplay: Redditors Demand Cross Platform Gameplay-What Does EA Say About This?
Malwarebytes Hack: 'Dark Halo' Is Similar to SolarWinds Attack Last Year
According to ZDNet, not only is the attack similar, but the creators of the "Dark Halo" security threat are the ones suspected to be responsible for the SolarWinds attack towards the end of 2020. The same group who are responsible for the compromise of five US government agencies and 18,000 clients makes another successful attack.
And again, this involved another cybersecurity agency, with Malwarebytes being one of the most popular companies that specialize in a more advanced version of a computer virus, the malware. The US government pointed fingers at Russian hackers to be working behind the attack, accessing confidential emails in the Treasury and Homeland Security's systems.
Now, the hackers breached its networks via an Office 365 email protection product which remained dormant within its systems. The company said that once it learned and detected the suspicious activity, it immediately began an investigation and evaluated its systems for what it suffered and what was taken.
Malwarebytes Hack: No Products are Affected by the Hack
According to Malwarebytes' blog post from co-founder and CEO, Marcin Kleczynski, the company's products were not affected by the recent hack, and its services and offers are still operational for all its uses. The CEO said that it already has a read on the hackers which "poisoned" SolarWinds' Orion platform that used the "Sunburst" malware unto its systems.
The attack on SolarWinds became a great example and lesson for Malwarebytes, which immediately led them to check on its source code, and the different processes on its software and systems. In the SolarWinds attack, the alleged Russians used a "supply chain nature" on their attacks which targeted systems without alerting its security.
Malwarebytes said that they detected the attack last December 15, and already took action as soon as its systems detected the breach. The company did not hesitate and has been working on strengthening its systems ever since.
Related Article : Netflix Users Receive Fake Billing Message! Here's What Experts Say You Need to Do to Avoid the Massive Scam
This article is owned by Tech Times
Written by Isaiah Alonzo