Written by Shannon Vavra
Attackers behind the SolarWinds hacking campaign successfully stole Mimecast source code as part of their sweeping espionage operation, the email security firm said in an incident report published Tuesday.
The hackers, which U.S. government officials suggested are “likely” Russian actors, “accessed and downloaded a limited number of our source code repositories, but we found no evidence of any modifications to our source code nor do we believe there was any impact on our products,” Mimecast said in the incident report.
Mimecast had previously disclosed that the hackers compromised a security certificate the company used to secure connections. The latest revelation, which comes more than two months after its disclosure the certificate was compromised, now underscores just how long it may take to get a full picture of the hackers’ espionage operation.
“Many of the private sector compromises are technology companies including networks of companies whose products can be used to launch other intrusions,” Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger said during a White House press briefing in February.
As the Biden administration works to respond to SolarWinds and the exploitation of newly disclosed Microsoft Exchange Server vulnerabilities, the federal government is weighing whether it should roll out cybersecurity ratings for software in order to promote secure software practices, one senior administration official told reporters earlier this month.