Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Mimecast Discloses Microsoft 365 SSL Certificate Compromise

Mimecast Discloses Microsoft 365 SSL Certificate Compromise

Email security company Mimecast has disclosed today that a “sophisticated threat actor” compromised one of the certificates the company issues for customers to securely connect Microsoft 365 Exchange to their services.

Mimecast discovered that the certificate was compromised after recently receiving a notification from Microsoft.

“Microsoft recently informed us that a Mimecast-issued certificate provided to certain customers to authenticate Mimecast Sync and Recover, Continuity Monitor, and IEP products to Microsoft 365 Exchange Web Services has been compromised by a sophisticated threat actor,” Mimecast said earlier today.

While the exact number of customers who used the stolen certificate to secure the connection used for Microsoft 365 cloud synchronization server tasks was not disclosed, Mimecast says that roughly 10 percent of their customers “use this connection.”

The company says that it currently has more than 36,000 customers, with 10% of them amounting to roughly 3,600 affected customers.

Mimecast also said that it found evidence that “a low single-digit number of our customers’ M365 tenants were targeted” by the threat actor who compromised the certificate. The company added that it reached out to these customers to remediate and address this issue.

Also Read: How to Prevent WhatsApp Hack: 7 Best Practices

“As a precaution, we are asking the subset of Mimecast customers using this certificate-based connection to immediately delete the existing connection within their M365 tenant and re-establish a new certificate-based connection using the new certificate we’ve made available,” Mimecast added.

“Taking this action does not impact inbound or outbound mail flow or associated security scanning.”

The security of our customers is always our top priority. We have engaged a third-party forensics expert to assist in our investigation, and we will work closely with Microsoft and law enforcement as appropriate. – Mimecast

While Mimecast did not say what type of certificate was compromised by the attackers, the statement published earlier today most likely refers to one of the Mimecast-issued Trusted SSL certificates customers have to install on their Exchange Client Access servers to secure the connection to the Microsoft 365 servers.

The regional certificates relative to customers’ accounts have to be uploaded to Microsoft 365 to create a Server Connection in Mimecast.

One of these self-issued certificates was compromised or stolen, which could have potentially allowed the threat actors to use it in man-in-the-middle (MiTM) attacks.

Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup

A Mimecast spokesperson told BleepingComputer earlier today that the investigation of this incident is still ongoing and that the company does not have additional information to share.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us