Monday, March 17, 2025
Homecyber securityCyber Attack on Dr.Web Forces Servers Disconnection

Cyber Attack on Dr.Web Forces Servers Disconnection

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity firm Dr.Web faced a targeted cyber attack on its infrastructure on September 14.

The incident prompted the company to disconnect its servers as a precautionary measure. Despite the disruption, no users protected by Dr.Web’s systems were affected.

Dr.Web specialists swiftly detected the attempted breach, allowing them to prevent any significant harm to their infrastructure.

The company has emphasized that its rapid response was crucial in ensuring that none of its users experienced adverse effects from the attack.

A company spokesperson stated, “The attempt to harm our infrastructure was prevented promptly,” highlighting the effectiveness of their security protocols.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

Temporary Suspension of Virus Database Releases

As part of its security measures, Dr.Web has temporarily suspended the release of its virus databases. This decision allowed for thoroughly examining its resources, ensuring no vulnerabilities remain.

The company has assured its users that this suspension is temporary, and they are working diligently to resume normal operations as soon as possible.

To expedite the diagnostic process, Dr.Web is utilizing its Dr.Web FixIt! Service, including a particular pre-release version for Linux.

This tool is being employed to scan and eliminate any potential consequences of the attack more efficiently.

The company remains committed to maintaining the highest cybersecurity standards for its users.

Dr.Web has reassured its users and stakeholders that the release of virus databases will resume shortly. The company is focused on restoring its services while ensuring the integrity and security of its systems.

“Our priority is to ensure that our resources are thoroughly checked and secure before reconnecting them to the network,” said a representative from Dr.Web.

This incident serves as a reminder of the ongoing threats faced by cybersecurity firms and the importance of robust security measures.

Dr.Web’s proactive approach to handling this situation underscores its commitment to safeguarding users’ data and maintaining trust in its services.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache...

European Cyber Report 2025: 137% More DDoS Attacks Than Last Year – What Companies Need to Know

Cyberattacks are no longer an abstract threat - they dominate risk planning for companies...

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Jaguar Land Rover Hit by HELLCAT Ransomware Using Stolen Jira Credentials

The HELLCAT ransomware group has claimed responsibility for a significant data breach at Jaguar...

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache...

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS)...