Hackers breach Bit9's network to attack customers with malware

Security

by CBR Staff Writer| 11 February 2013

The firm identified three customers who were targeted by the malicious software.

Hackers have breached security software developer, Bit9's, digital code-signing certificate through unprotected internal servers while attacking some of its customers.

The company uses a system where customers digitally sign their software to know whether the software is safe to operate on their PCs.

"As a result, a malicious third party was able to illegally gain temporary access to one of our digital code-signing certificates that they then used to illegitimately sign malware," Bit 9 Chief executive Patrick Morley said.

"There is no indication that this was the result of an issue with our product. Our investigation also shows that our product was not compromised."

The firm identified three customers who were targeted by the malicious software which had been digitally signed with untrustworthy credentials.

Customers of the security firm include the US military, intelligence agencies, five of the top 10 aerospace and defence firms in the Fortune 500, six of the top 10 petroleum refineries and three of the top 10 banks.

"The fact that this happened -- even to us -- shows that the threat from malicious actors is very real, extremely sophisticated, and that all of us must be vigilant," Morley added.

"We are confident that the steps we have taken will address this incident while preventing a similar issue from occurring again."

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

754 people like this.
0 people follow this.

Security Intelligence

Suppliers Directory

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.