Mimecast may also have been a victim of the SolarWinds hack campaign
Compromised certificate is used by 10 percent of Mimecast’s customers
When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.
Mimecastcould also be a potential victim of the recentSolarWinds hackas the company has revealed that one of its certificates used to authenticate its products toMicrosoft365 Exchange Web Services was compromised by a sophisticated threat actor.
The email and data security company said the compromised certificate is used to authenticate its Sync and Recover, Continuity Monitor and Internal Email Protect (IEP) products. However, it wasn’t Mimecast that discovered the compromised certificate but ratherMicrosoft.
In ablog postinforming its users of the compromised certificate, Mimecast explained that 10 percent of its customers are affected, saying:
“Approximately 10 percent of our customers use this connection. Of those that do, there are indications that a low single digit number of our customers’ M365 tenants were targeted. We have already contacted these customers to remediate the issue. The security of our customers is always our top priority. We have engaged a third-party forensics expert to assist in our investigation, and we will work closely with Microsoft and law enforcement as appropriate.”
Compromised certificate
Mimecast is advising the 10 percent of its customer base using the compromised certificate to immediately delete the exiting connection within theirMicrosoft 365tenant. These customers should then re-establish a new connection using a new certificate that the company has made available.
In astatementtoCRN, a spokesperson from Microsoft said that it will be blocking the compromised certificate, saying:
“We can confirm that a certificate provided by Mimecast was compromised by a sophisticated actor. This certificate enables their customers to connect certain Mimecast applications to their M365 tenant. At Mimecast’s request, we are blocking this certificate on Monday, January 18, 2021.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The reason that Mimecast may have been attacked by the same threat actor behind the SolarWinds hack is due to the fact that these hackers often add authentication tokens and credentials to Microsoft Active Directory domain accounts in order to maintain persistence on a network and to achieve privilege escalation. According toCISA, these tokens enable access to both an organization’s on-premises and hosted resources.
Mimecast is currently investigating the matter further and we’ll likely find out if there is a connection to the SolarWinds hack once the company’s investigation is concluded.
ViaCRN
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.
This new malware utilizes a rare programming language to evade traditional detection methods
A new form of macOS malware is being used by devious North Korean hackers
Arcane season 2 confirms the hit series isn’t just one of the best Netflix shows ever made – it’s an animated legend that’ll stand the test of time