Saturday, June 14, 2025
Homecyber securityCyber Attack on Dr.Web Forces Servers Disconnection

Cyber Attack on Dr.Web Forces Servers Disconnection

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity firm Dr.Web faced a targeted cyber attack on its infrastructure on September 14.

The incident prompted the company to disconnect its servers as a precautionary measure. Despite the disruption, no users protected by Dr.Web’s systems were affected.

Dr.Web specialists swiftly detected the attempted breach, allowing them to prevent any significant harm to their infrastructure.

- Advertisement - Google News

The company has emphasized that its rapid response was crucial in ensuring that none of its users experienced adverse effects from the attack.

A company spokesperson stated, “The attempt to harm our infrastructure was prevented promptly,” highlighting the effectiveness of their security protocols.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

Temporary Suspension of Virus Database Releases

As part of its security measures, Dr.Web has temporarily suspended the release of its virus databases. This decision allowed for thoroughly examining its resources, ensuring no vulnerabilities remain.

The company has assured its users that this suspension is temporary, and they are working diligently to resume normal operations as soon as possible.

To expedite the diagnostic process, Dr.Web is utilizing its Dr.Web FixIt! Service, including a particular pre-release version for Linux.

This tool is being employed to scan and eliminate any potential consequences of the attack more efficiently.

The company remains committed to maintaining the highest cybersecurity standards for its users.

Dr.Web has reassured its users and stakeholders that the release of virus databases will resume shortly. The company is focused on restoring its services while ensuring the integrity and security of its systems.

“Our priority is to ensure that our resources are thoroughly checked and secure before reconnecting them to the network,” said a representative from Dr.Web.

This incident serves as a reminder of the ongoing threats faced by cybersecurity firms and the importance of robust security measures.

Dr.Web’s proactive approach to handling this situation underscores its commitment to safeguarding users’ data and maintaining trust in its services.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

Arsen Launches AI-Powered Vishing Simulation to Help Organizations Combat Voice Phishing at Scale

Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...

Credential Abuse: 15-Min Attack Simulation

Credential Abuse Unmasked

Credential abuse is #1 attack vector in web and API breaches today (Verizon DBIR 2025). Join our live, 15-min attack simulation with Karthik Krishnamoorthy (CTO - Indusface) and Phani Deepak Akella (VP of Marketing - Indusface) to see hackers move from first probe to full account takeover.

Discussion points


Username & email enumeration – how a stray status-code reveals valid accounts.
Password spraying – low-and-slow guesses that evade basic lockouts.
Credential stuffing – lightning-fast reuse of breach combos at scale.
MFA / session-token bypass – sliding past second factors with stolen cookies.

More like this

Kali Linux 2025.2 Released: New Tools, Smartwatch and Car Hacking Added

Kali Linux, the preferred distribution for security professionals, has launched its second major release...

NIST Releases New Guide – 19 Strategies for Building Zero Trust Architectures

The National Institute of Standards and Technology (NIST) has released groundbreaking guidance to help...

Spring Framework Flaw Enables Remote File Disclosure via “Content‑Disposition” Header

A medium-severity reflected file download (RFD) vulnerability (CVE-2025-41234) in VMware's Spring Framework has been...