Security firm ESET is refuting reports that cyberattackers compromised its platforms and used them to target customers in Israel with dangerous wiper malware. However, it did note that a partner there, Comsecure, was impacted.
“We are aware of a security incident which affected our partner company in Israel last week,” the firm acknowledged on social media platform X. “Based on our initial investigation, a limited malicious email campaign was blocked within ten minutes. ESET technology is blocking the threat and our customers are secure. ESET was not compromised and is working closely with its partner to further investigate and we continue to monitor the situation.”
Security researcher Kevin Beaumont (aka Gossi the Dog) prompted the response after blogging about a malicious email that an ESET user posted on the ESET user forum. The email was flagged as malicious, with the subject line, “Government-Backed Attackers May Be Trying to Compromise Your Device!” It purported to be from the ESET team, offering extra security defense in the face of an ongoing attack:
Source: ESET user forum.
The email had a .ZIP attachment that, if opened, unpacked a destructive wiper malware that bears resemblance to that used by the Handala threat group, according to the person who flagged the email for Beaumont. Handala, so named for the political cartoon character that has come to personify the Palestinian people’s national identity, is known for targeting Israeli organizations with file-destroying wipers in the wake of the Oct. 7 Hamas attacks and resulting war.
Beaumont noted, “I managed to obtain the email, which passes both DKIM and SPF checks for coming from ESET’s store,” he said in the blog post. “Additionally, the link is indeed to backend.store.eset.co.il — owned by ESET Israel.”
This led Beaumont to conclude via Mastodon, “ESET Israel definitely got compromised, this thing is fake ransomware that talks to an Israeli news org server for whatever reason.”
ESET has now categorically refuted that takeaway, so the assumption is that the cyberattackers were using some sort of MO to get around anti-spoofing measures for the email and the .ZIP link. ESET did not immediately return a request for comment from Dark Reading for more information on Comsecure’s role in the incident and the attack routine.
The campaign is now blocked for ESET customers.
Source link
#ESETBranded #Attack #Targets #Israel #Firm #Denies #Compromise
Unlock the potential of cutting-edge AI solutions with our comprehensive offerings. As a leading provider in the AI landscape, we harness the power of artificial intelligence to revolutionize industries. From machine learning and data analytics to natural language processing and computer vision, our AI solutions are designed to enhance efficiency and drive innovation. Explore the limitless possibilities of AI-driven insights and automation that propel your business forward. With a commitment to staying at the forefront of the rapidly evolving AI market, we deliver tailored solutions that meet your specific needs. Join us on the forefront of technological advancement, and let AI redefine the way you operate and succeed in a competitive landscape. Embrace the future with AI excellence, where possibilities are limitless, and competition is surpassed.