comscore Employee's personal Google account led to a major data breach, admits Cisco
News

Hacker breached our network via employee Google account, says Cisco

The company said it has not identified any evidence suggesting that the attacker gained access to critical internal systems, such as those related to product development, code signing, etc.

Hacked

Image: Pixabay



Networking giant Cisco has admitted a cyber-security breach via the “successful compromise” of an employee’s personal Google account, saying that no data was compromised. Also Read - Google Pixel tablet details leaked online: Here’s what we know so far

The attacker conducted a series of sophisticated voice phishing attacks under the guise of various trusted organisations attempting to convince the victim to accept multi-factor authentication (MFA) push notifications initiated by the attacker, the company’s own Cisco Talos threat research arm revealed in a blog post. Also Read - Planning to buy a Fitbit smartwatch? You will need a Google account starting 2023

The incident occurred in May and since then, the company had been working to remediate the attack. Also Read - Google confirms to launch Pixel 7, Pixel 7 Pro in India soon

“During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronised,” wrote Cisco Talos.

The company said it has not identified any evidence suggesting that the attacker gained access to critical internal systems, such as those related to product development, code signing, etc.

“The threat actor was successfully removed from the environment and displayed persistence, repeatedly attempting to regain access in the weeks following the attack; however, these attempts were unsuccessful,” said Cisco.

According to the company, the attack was conducted by an adversary that has been previously identified as an initial access broker (IAB) with ties to the UNC2447 cybercrime gang, Lapsus$ threat actor group, and Yanluowang ransomware operators.

Lapsus$ is a threat actor group that is reported to have been responsible for several previous notable breaches of corporate environments.

Cisco said it implemented a company-wide password reset immediately upon learning of the incident.

The company did not observe ransomware deployment in this attack.

In many cases, threat actors have been observed targeting the backup infrastructure in an attempt to further remove an organisation’s ability to recover following an attack.

“Ensuring that backups are offline and periodically tested can help mitigate this risk and ensure an organisation’s ability to effectively recover following an attack,” said the company.

–IANS

  • Published Date: August 14, 2022 10:57 AM IST
For the latest tech news across the world, latest PC and Mobile games, tips & tricks, top-notch gadget reviews of most exciting releases follow BGR India’s Facebook, Twitter, subscribe our YouTube Channel. Also follow us on  Facebook Messenger for latest updates.