Hacker breached our network via employee Google account: Cisco

Cisco said it implemented a company-wide password reset immediately upon learning of the incident. The company did not observe ransomware deployment in this attack.

Published: 13th August 2022 02:44 PM  |   Last Updated: 13th August 2022 02:44 PM   |  A+A-

hacking, snooping, cyber crime

Representational Image. (File Photo)


NEW DELHI: Networking giant Cisco has admitted a cyber-security breach via the "successful compromise" of an employee's personal Google account, saying that no data was compromised.

The attacker conducted a series of sophisticated voice phishing attacks under the guise of various trusted organisations attempting to convince the victim to accept multi-factor authentication (MFA) push notifications initiated by the attacker, the company's own Cisco Talos threat research arm revealed in a blog post.

The incident occurred in May and since then, the company had been working to remediate the attack.

"During the investigation, it was determined that a Cisco employee's credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim's browser were being synchronised," wrote Cisco Talos.

The company said it has not identified any evidence suggesting that the attacker gained access to critical internal systems, such as those related to product development, code signing, etc.

"The threat actor was successfully removed from the environment and displayed persistence, repeatedly attempting to regain access in the weeks following the attack; however, these attempts were unsuccessful," said Cisco.

According to the company, the attack was conducted by an adversary that has been previously identified as an initial access broker (IAB) with ties to the UNC2447 cybercrime gang, Lapsus$ threat actor group, and Yanluowang ransomware operators.

Lapsus is a threat actor group that is reported to have been responsible for several previous notable breaches of corporate environments.

Cisco said it implemented a company-wide password reset immediately upon learning of the incident. The company did not observe ransomware deployment in this attack.

In many cases, threat actors have been observed targeting the backup infrastructure in an attempt to further remove an organisation's ability to recover following an attack.

"Ensuring that backups are offline and periodically tested can help mitigate this risk and ensure an organisation's ability to effectively recover following an attack," said the company.


Disclaimer : We respect your thoughts and views! But we need to be judicious while moderating your comments. All the comments will be moderated by the newindianexpress.com editorial. Abstain from posting comments that are obscene, defamatory or inflammatory, and do not indulge in personal attacks. Try to avoid outside hyperlinks inside the comment. Help us delete comments that do not follow these guidelines.

The views expressed in comments published on newindianexpress.com are those of the comment writers alone. They do not represent the views or opinions of newindianexpress.com or its staff, nor do they represent the views or opinions of The New Indian Express Group, or any entity of, or affiliated with, The New Indian Express Group. newindianexpress.com reserves the right to take any or all comments down at any time.

flipboard facebook twitter whatsapp