• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Mimecast Cert Abused to Target Inboxes in “Sophisticated” Attack

You are here: Home / General Cyber Security News / Mimecast Cert Abused to Target Inboxes in “Sophisticated” Attack

Mimecast has disclosed that some of its customers have been targeted by an advanced attack built to compromise their Microsoft 365 (M365) environments.

The security vendor explained in a quick assertion yesterday that a “sophisticated menace actor” received one particular of its certificates utilized to authenticate Mimecast Sync and Recuperate, Continuity Monitor and IEP products and solutions to Microsoft 365 Exchange Web Providers.

Whilst 10% of customers use this certification, the attacker only specific a “low one-digit number” of customer M365 tenants. These organizations have currently been contacted by Mimecast to remediate the challenge.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Bitdefender Internet Security 2021

Protect yourself against all threads using Bitderender. Get Bitdefender Internet Security with 68% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“As a precaution, we are inquiring the subset of Mimecast consumers utilizing this certification-primarily based connection to right away delete the current relationship inside of their M365 tenant and re-set up a new certificate-based mostly relationship applying the new certificate we’ve produced obtainable,” the assertion continued.

“Taking this action does not effects inbound or outbound mail movement or related security scanning.”

There’s no information but on who might be responsible for this advanced attack and/or no matter whether nation point out actors were involved. SolarWinds unveiled in a submitting with the SEC very last thirty day period that it experienced been notified by Microsoft of a compromise of its Workplace 365 e-mail by using an unspecified “attack vector.”

“SolarWinds, in collaboration with Microsoft, has taken remediation techniques to address the compromise and is investigating no matter whether further more remediation methods are required, about what period of time of time this compromise existed and no matter whether this compromise is linked with the attack on its Orion application make method,” it defined at the time.

“SolarWinds also is investigating in collaboration with Microsoft as to whether any client, staff or other details was exfiltrated as a final result of this compromise but has uncovered no proof at this time of any these kinds of exfiltration.”

In the meantime, Mimecast stated it has employed a 3rd-party forensics company to aid with its investigation, and is doing the job closely with Microsoft and regulation enforcement.


Some parts of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News #COVID19 Led to Surge in Malware Attacks Last Year

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Mimecast Cert Abused to Target Inboxes in “Sophisticated” Attack
  • #COVID19 Led to Surge in Malware Attacks Last Year
  • Mimecast admits hackers accessed users’ Microsoft accounts
  • #CES2021: Raising the Bar on Privacy and Trust Online in 2021
  • Microsoft fixes actively exploited Defender zero-day flaw
  • Microsoft Fixes Windows Defender Zero-Day Bug
  • Channel Pro Insight: A fast guide to central network management
  • Intel Adds Hardware-Enabled Ransomware Detection to 11th Gen vPro Chips
  • Healthcare Hit by 187 Million Monthly Web App Attacks in 2020
  • World’s largest dark web marketplace taken offline

Copyright © TheCyberSecurity.News, All Rights Reserved.