Cybersecurity firm Dr.Web faced a targeted cyber attack on its infrastructure on September 14.
The incident prompted the company to disconnect its servers as a precautionary measure. Despite the disruption, no users protected by Dr.Web’s systems were affected.
Dr.Web specialists swiftly detected the attempted breach, allowing them to prevent any significant harm to their infrastructure.
The company has emphasized that its rapid response was crucial in ensuring that none of its users experienced adverse effects from the attack.
A company spokesperson stated, “The attempt to harm our infrastructure was prevented promptly,” highlighting the effectiveness of their security protocols.
Decoding Compliance: What CISOs Need to Know – Join Free Webinar
As part of its security measures, Dr.Web has temporarily suspended the release of its virus databases. This decision allowed for thoroughly examining its resources, ensuring no vulnerabilities remain.
The company has assured its users that this suspension is temporary, and they are working diligently to resume normal operations as soon as possible.
To expedite the diagnostic process, Dr.Web is utilizing its Dr.Web FixIt! Service, including a particular pre-release version for Linux.
This tool is being employed to scan and eliminate any potential consequences of the attack more efficiently.
The company remains committed to maintaining the highest cybersecurity standards for its users.
Dr.Web has reassured its users and stakeholders that the release of virus databases will resume shortly. The company is focused on restoring its services while ensuring the integrity and security of its systems.
“Our priority is to ensure that our resources are thoroughly checked and secure before reconnecting them to the network,” said a representative from Dr.Web.
This incident serves as a reminder of the ongoing threats faced by cybersecurity firms and the importance of robust security measures.
Dr.Web’s proactive approach to handling this situation underscores its commitment to safeguarding users’ data and maintaining trust in its services.
Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial
A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing millions…
Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer through…
An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the initial…
A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store, which…
The Lazarus Group has recently employed a sophisticated attack, dubbed "Operation DreamJob," to target employees…
NodeStealer, initially a JavaScript-based malware, has evolved into a more sophisticated Python-based threat that targets…