Networking giant Cisco has admitted a cyber-security breach via the “successful compromise” of an employee’s personal Google account, saying that no data was compromised.
The attacker conducted a series of sophisticated voice phishing attacks under the guise of various trusted organisations attempting to convince the victim to accept multi-factor authentication (MFA) push notifications initiated by the attacker, the company’s own Cisco Talos threat research arm revealed in a blog post.
The incident occurred in May and since then, the company had been working to remediate the attack.
“During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronised,” wrote Cisco Talos.
The company said it has not identified any evidence suggesting that the attacker gained access to critical internal systems, such as those related to product development, code signing.
“The threat actor was successfully removed from the environment and displayed persistence, repeatedly attempting to regain access in the weeks following the attack; however, these attempts were unsuccessful,” said Cisco.
According to the company, the attack was conducted by an adversary that has been previously identified as an initial access broker (IAB) with ties to the UNC2447 cybercrime gang, Lapsus$ threat actor group, and Yanluowang ransomware operators.
Lapsus$ is a threat actor group that is reported to have been responsible for several previous notable breaches of corporate environments.
Cisco said it implemented a company-wide password reset immediately upon learning of the incident.The company did not observe ransomware deployment in this attack.
In many cases, threat actors have been observed targeting the backup infrastructure in an attempt to further remove an organisation’s ability to recover following an attack.
“Ensuring that backups are offline and periodically tested can help mitigate this risk and ensure an organisation’s ability to effectively recover following an attack,” said the company.