Wednesday, February 12, 2025
HomeData BreachSecurity Giant Entrust Hacked - Attackers Stole Data From Internal Systems

Security Giant Entrust Hacked – Attackers Stole Data From Internal Systems

Published on

SIEM as a Service

Follow Us on Google News

Entrust, a big name in digital security, announced recently on its website that it has been attacked by hackers. During this attack, hackers breached their firewalls and stole data from their internal systems through breaches in their network.

It is an online trust and identity management company specializing in the deployment and management of online trust and identity, offering a variety of security services such as:- 

  • Encrypted communications
  • Secure digital payments
  • ID issuance solutions

While their security services are used by several critical government agencies and organizations in the United States.

Affected Critical Organizations

Consequently, based on the nature of this incident and the services offered, it is obvious that the effect of this attack would be felt by a large number of critical organizations.

This encloses the following critical agencies and organizations:-

  • Department of Energy
  • Department of Homeland Security
  • The Department of the Treasury
  • The Department of Health & Human Services
  • The Department of Veterans Affairs
  • The Department of Agriculture

Entrust Hacked

In a cyberattack that occurred on June 18th, Entrust was breached and essential corporate data was stolen by the hackers. 

It was only recently that Entrust’s customers were notified of the breach, following a screenshot taken by security researcher Dominic Alvieri.

The screenshot itself appeared to be a security notice, which was addressed to Entrust’s clients. There has been a security breach that has been confirmed in a security notice sent to Entrust’s customers. 

At this point, it is not known yet whether the data in question is completely corporate data only or whether it includes the data of customers and vendors also.

Attacked By Ransomware Gang!

While the attack has been speculated to have been carried out by a well-known ransomware gang in order to extort money from the company. The exact nature of the encryption that was used during the attack or even whether the devices were encrypted or not is unclear at this time.

As soon as public information about the stolen data is released, it is likely that the ransomware operation behind the attack will be revealed.

It has been confirmed that Entrust, along with a leading cybersecurity firm, is actively investigating the attack with the help of law enforcement agencies. At the moment, it does not seem to have impacted the operations of the company.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Chrome’s Safe Browsing Now Protects 1 Billion Users Worldwide

Google's Safe Browsing technology now ensures enhanced protection for over 1 billion Chrome users...

Critical Ivanti CSA Vulnerability Allows Attackers Remote Code Execution to Gain Restricted Access

A critical vulnerability has been discovered in the Ivanti Cloud Services Application (CSA), potentially...

Critical OpenSSL Vulnerability Let Attackers Launch Man-in-the-Middle Attacks

A high-severity security vulnerability (CVE-2024-12797) has been identified in OpenSSL, one of the most...

Fortinet FortiOS & FortiProxy Zero-Day Exploited to Hijack Firewall & Gain Super Admin Access

Cybersecurity firm Fortinet has issued an urgent warning regarding a newly discovered zero-day authentication...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

Threat actors from dark web forums claim to have stolen and leaked 20 million...

Globe Life Ransomware Attack Exposes Personal and Health Data of 850,000+ Users

Globe Life Inc., a prominent insurance provider, has confirmed a major data breach that...

BeyondTrust Zero-Day Breach – 17 SaaS Customers API Key Compromised

BeyondTrust, a leading provider of identity and access management solutions, disclosed a zero-day breach...