[ad_1]
Email security provider Mimecast said on Tuesday that hackers had hijacked its products in order to spy on its customers.
The company said it had been alerted to the attack by investigators at Microsoft and that “a sophisticated threat actor” had compromised the certificate used to guard connections between its products and Microsoft’s cloud services.
For the latest headlines, follow our Google News channel online or via the app.
In a four-paragraph statement, the company said around 10 percent of its more than 36,000 customers had been affected, but it believed “a low single digit number” of users had been specifically targeted.
Mimecast spokeswoman Laura Barnes declined further comment. “Our investigation is ongoing and we don’t have anything additional to share at this time,” she said.
Mimecast provides a range of email security products, such as systems to block malicious web links, phishing attempts and attackers using fake identities in order to trick their victims into revealing sensitive information.
Three cybersecurity investigators, who spoke on condition of anonymity to discuss details of an ongoing probe, told Reuters they suspected the hackers who compromised Mimecast were the same group that broke into US software maker SolarWinds and a host of sensitive US government agencies.
The SolarWinds hack was disclosed last month and is one of the most ambitious cyber-espionage campaigns ever uncovered. US intelligence agencies have blamed Russia, which has repeatedly denied the allegations.
Read more:
Biden promises to punish those behind hack against US government
US agencies hacked in global cyberspying campaign that lasted months
Twitter says hack targeted 130 accounts, company is ‘embarrassed’ and ‘sorry’
SHOW MORE
Last Update: Tuesday, 12 January 2021 KSA 19:25 – GMT 16:25
window.fbAsyncInit = function() {
FB.init({
appId : '477847702293720',
xfbml : true,
version : 'v2.4'
});
};
(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = "https://connect.facebook.net/en_US/sdk.js";
fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));
[ad_2]
Source link