

- #MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET UPDATE#
- #MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET SOFTWARE#
- #MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET CODE#
Teardrop was then installed on one of these computers the following day. This has been extensively documented in the victim's case, two computers were compromised in this way.
#MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET UPDATE#
One victim had SunBurst installed via the SolarWinds Orion update in early July 2020.

Instead, it appears elsewhere on networks where at least one computer has already been compromised by Sunburst. Symantec has not yet found any evidence that Raindrop was spread directly from Sunburst.While Teardrop was delivered by the original Sunburst backdoor (Backdoor.Sunburst), Raindrop appears to have been used to spread on the victim's network.Raindrop is very similar to the previously documented Teardrop tool, but there are some important differences between the two. Symantec calls the malware Raindrop (Backdoor.Raindrop), which is a loader that delivers a Cobalt Strike payload. This was used in the SolarWinds attacks and deployed against a select number of victims of interest to the attackers. Symantec security researchers describe in this blog post that they have uncovered an additional piece of malware. Further details can be found in the Malwarebytes announcement. Malwarebytes seems to have gotten away with a 'black eye'. Whether there's anything more to come will have to wait and see.
#MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET SOFTWARE#
The vendor states that MalwareBytes software is still safe to use. All internal Malwarebytes systems showed no signs of unauthorized access or compromise across all on-premises and production environments. This included reverse engineering of their own software.
#MALWAREBYTES SOLARWINDS OFFICECIMPANUZDNET CODE#
Given the supply chain nature of the SolarWinds attack, an immediate investigation was conducted into all Malwarebytes source code and build and deployment processes. Malwarebyte production systems not affected Malwarebytes notes that it does not use Azure cloud services in its production environments.īleeping Computer reported, that the hacker used a self-signed certificate with credentials to the Microsoft Graph service principal account to access the emails. This allowed access to a limited subset of internal corporate email. The investigation revealed that the attackers were exploiting an inactive email protection product within the Malwarebytes Office 365 tenant. Together, the teams then conducted a comprehensive investigation of both Malwarebytes cloud and on-premises environments for activity related to the API calls that triggered the initial alert. Upon notification by Microsoft's MSRC, the Malwarebytes Incident Response Group was immediately activated and Microsoft's Detection and Response Team (DART) was engaged.


Since Malwarebytes does not use SolarWinds Orion, the attack occurred via a different vector that allows the misuse of applications with privileged access to Microsoft Office 365 and Azure environments.There is evidence that points to an abuse of privileged access to Microsoft Office 365 and Azure environments.Malwarebytes was targeted by state hackers responsible for the SolarWinds operation.Now, about a month later, they reported, that they themselves were victims of this successful hack. After all, Malwarebytes also provides malware detection software. The article generally listed the available information, which makes sense. Malwarebytes had generally reported the SolarWinds hacking operation involving over 200 victims in the US on December 14, 2020.
