Sophos takes down partner portal after signs of hacking
Sophos believes that hackers might have stolen sensitive user information from its partner portal
IDG News Service - Security firm Sophos has taken its partner portal offline and will reset every user's password after it found signs of a potential security breach on the server hosting it.
"Two unauthorized programs were found on the server, and our preliminary investigations indicate that these were designed to allow unauthorized remote access to information," Sophos said in a security alert posted on its website.
The company's staff found the unauthorized applications during a routine security check on April 3, and the potentially compromised server was immediately taken offline for further investigation, the company said.
Sophos could not establish if the data stored in the website's database, which includes partners' names and business addresses, email addresses, contact details, and hashed passwords, had been stolen. However, it decided to proceed under the assumption that it had.
The website will be restored after the security audit is completed and the problem is remediated. However, all user passwords will be forcibly reset as an additional precaution.
The company advised its partners to also change their passwords on other websites where they might have used them, and to be on alert for potential phishing emails that claim to originate from Sophos.
It's relatively common for attackers responsible for breaches that result in stolen email addresses to exploit the known business relationship between the affected users and the victim organization through phishing, in an attempt to extract more information.
In situations where the affected organizations are security firms like Sophos, such phishing attacks can have a high rate of success, because of the inherent trust that exists between users and their security vendors.
"We realize that the site's downtime and the forced password resets may be an overreaction and are sorry for the disruption this will cause, but we would rather cause some inconvenience at this stage than delay as we wait for further information," the company said.
Only the older partner portal, located at https://gpp.partners.sophos.com, has been affected by this security incident, Sophos said. Partners that have already moved to its new Salesforce.com-based portal don't have to worry about the password resets or downtime.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts