Russian cyber firm Dr.Web denies data leak by pro-Ukraine hackers

Avatar

Russian antivirus company Dr.Web denied on Wednesday that its customer data was leaked during a cyberattack earlier in September.

The company released a statement after the pro-Ukraine group known as DumpForums claimed responsibility for the breach, stating they had stolen around 10 terabytes of data, including client databases.

In response to DumpForums, Dr.Web said that the information published by the hackers “is mostly untrue,” adding that user data was not affected during the attack and that there are no security risks for customers.

The hackers had said they had access to Dr.Web’s network for a month and remained undetected. Among the services the group allegedly breached were the company’s corporate GitLab server, which stored internal projects, as well as the corporate mail server and software management services.

“All the company’s security improvement projects now seem to need protection themselves,” the hackers said.

As evidence of the attack, they provided links to several alleged Dr.Web databases. It is not clear if the information they contain is authentic.

Dr.Web said that it cannot provide more details about the attack so as not to interfere with the ongoing investigation by law enforcement.

“The attack was promptly thwarted, all services were disconnected from the network and underwent thorough inspection in accordance with security protocols,” the company said. “The hackers’ main goal was to demand a ransom from our company, but we do not conduct any negotiations.”

The company said it is “investigating screenshots posted in the hackers’ Telegram channels to identify compromised data.”

Dr.Web has been around for more than 30 years and is considered one of Russia’s largest domestic antivirus developers. Clients include Russian critical infrastructure operators, banks and telecom companies.

Following the cyberattack, Dr.Web was unable to update its virus and malware database for several days.

DumpForums has previously claimed responsibility for breaches of several Russian targets, including the national card payment system, a local cyber company, state agencies and an online pharmacy.

CybercrimeNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

New law in Australia will require mandatory reporting of ransomware payments

Next Post

CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance

Related Posts

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Cybersecurity researchers have warned of ongoing phishing campaigns that abuse refresh entries in HTTP headers to deliver spoofed email login pages that are designed to harvest users' credentials. "Unlike other phishing webpage distribution behavior through HTML content, these attacks use the response header sent by a server, which occurs before the processing of the HTML content," Palo Alto
Avatar
Read More

Embarking on a Compliance Journey? Here’s How Intruder Can Help

Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the process by helping you address the key vulnerability management criteria these frameworks demand, making your compliance journey much smoother. Read on to understand how to meet the requirements of each framework to keep your customer data safe. How Intruder
Avatar
Read More