Shutterstock
Mimecast has admitted that a number of its users may have their Microsoft 365 accounts accessed by “a sophisticated threat actor”.
The security incident involved hackers obtaining one of Mimecast’s digital certificates and abusing it to gain access to clients’ accounts.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
The cloud cyber security services provider was alerted about the incident by Microsoft, and the two companies are working with a third-party forensics expert and law enforcement to investigate the breach.
According to Mimecast, “approximately 10%” of its customers used the connection involving the affected certificate, with not more than nine customers believed to be affected by the breach.
“There are indications that a low single digit number of our customers’ M365 tenants were targeted,” the company announced in a blog post, adding that it had “already contacted these customers to remediate the issue”.
Mimecast also advised “customers using this certificate-based connection to immediately delete the existing connection within their M365 tenant and re-establish a new certificate-based connection using the new certificate” that the company had “made available”.
The London-based company said that taking this precaution would “not impact inbound or outbound mail flow or associated security scanning”.
The news comes days after it was revealed that the cyber criminals who compromised SolarWinds in a sophisticated supply chain cyber attack broke into Microsoft and accessed the company’s source code repositories.
However, it was also confirmed that the attackers, linked by US authorities to the Russian state, didn’t alter the codebase at the heart of Microsoft’s core products and services. They did so through an internal account that had permissions to view, but not edit, these repositories.
Mimecast also made headlines last year when its Threat Center researchers discovered a rise in LimeRAT malware delivery using Microsoft Excel’s “VelvetSweatshop” default password. The research team found making an Excel file read-only instead of locking it encrypts the file without needing an externally created password to open it.
For some time, hackers had taken advantage of how Excel’s encryption and decryption processes work to distribute malware, Mimecast said at the time.
Some parts of this article are sourced from:
www.itpro.co.uk