Mimecast Update: SolarWinds Hackers Stole Source Code : vima

Mimecast Update: SolarWinds Hackers Stole Source Code


Get Permission
Email security vendor Mimecast, which was targeted by the SolarWinds supply chain hack in January, reports in a Tuesday update that the hackers used the "Sunburst" backdoor as an initial attack vector to steal source code. But Mimecast says it "found no evidence of any modifications to our source code nor do we believe there was any impact on our products."
Mimecast reports that the hackers used the backdoor installed in SolarWinds' Orion network monitoring tool to gain partial access to its production environment.
The Tuesday update also notes: "The threat actor accessed certain Mimecast-issued certificates and related customer server connection information. The threat actor also accessed a subset of email addresses and other contact information, as well as encrypted and/or hashed and salted credentials."

Related Keywords

Russia , Solarwind Orion , Solarwinds Orion , Cisco Netflow , Fireeye Mandiant , Environmentakshaya Asokan , Exchange Web Services , Microsoft , Nation State Attacks , Fraud Management , Access Production Environmentakshaya Asokan , Solarwinds Hackers Stole Source , Live Webinar , Risks Associated , Azure Active Directory , White House Preparing , Executive Action After Solarwinds Attack , Mimecast , Solar Winds , Orion , Sunburst , Cyber Espionage , Fireeye , Mandiant , , ரஷ்யா , பரிமாற்றம் வலை சேவைகள் , மைக்ரோசாஃப்ட் , தேசம் நிலை தாக்குதல்கள் , மோசடி மேலாண்மை , வாழ வெபினார் , அபாயங்கள் தொடர்புடையது , நீலமான செயலில் அடைவு , வெள்ளை வீடு ப்ரிபேரிஂக் , சூரிய காற்று , ஒரையந் , சூரிய ஒளி , சைபர் உளவு , பிரீயே ,

© 2025 Vimarsana