Employee’s personal Google account led to a major data breach, admits Cisco
Networking giant Cisco has admitted a cyber-security breach via the “successful compromise” of an employee’s personal Google account, saying that no data was compromised. Also Read – ‘There will be blood on streets,’ Google execs warn employees about layoffs
The attacker conducted a series of sophisticated voice phishing attacks under the guise of various trusted organisations attempting to convince the victim to accept multi-factor authentication (MFA) push notifications initiated by the attacker, the company’s own Cisco Talos threat research arm revealed in a blog post. Also Read – YouTube plans to launch an online store for streaming videos: Report
The incident occurred in May and since then, the company had been working to remediate the attack. Also Read – Google Meet adds new features including integrating YouTube, Spotify
“During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronised,” wrote Cisco Talos.
The company said it has not identified any evidence suggesting that the attacker gained access to critical internal systems, such as those related to product development, code signing, etc.
“The threat actor was successfully removed from the environment and displayed persistence, repeatedly attempting to regain access in the weeks following the attack; however, these attempts were unsuccessful,” said Cisco.
According to the company, the attack was conducted by an adversary that has been previously identified as an initial access broker (IAB) with ties to the UNC2447 cybercrime gang, Lapsus$ threat actor group, and Yanluowang ransomware operators.
Lapsus$ is a threat actor group that is reported to have been responsible for several previous notable breaches of corporate environments.
Cisco said it implemented a company-wide password reset immediately upon learning of the incident.
The company did not observe ransomware deployment in this attack.
In many cases, threat actors have been observed targeting the backup infrastructure in an attempt to further remove an organisation’s ability to recover following an attack.
“Ensuring that backups are offline and periodically tested can help mitigate this risk and ensure an organisation’s ability to effectively recover following an attack,” said the company.
–IANS
$(document).ready(function(){
$('#commentbtn').on("click",function(){
(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src="https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.10&appId=133005220097303";
fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));
$(".cmntbox").toggle();
});
});
Checkout latest world news below links :
World News || Latest News || U.S. News
Source link