Breach, Vulnerability Management, MSP

Security Update: Dell, Dropbox Suffer Breaches

Share
(Adobe Stock Images)
  • Dell Confirms Cyber Hit, Denies Material Impact
  • Microsoft, Apple and Adobe Issue Security Updates: CISA
  • Accenture Teams with Mandiant, Palo Alto Networks and U.S. Navy
  • Hackers Hit Dropbox’s Sign Tool for PII Data
  • Nuspire: LockBit Ransomware on the Rise Again

Just because you’re a giant tech company that sells cybersecurity doesn’t mean you’re impervious to cyberattacks. A few cases in point this past week came from Dell and Dropbox. Both companies recently suffered cyberattacks.

In addition, several companies reported vulnerabilities in their technologies, including Microsoft, Apple, Adobe, Rockwell Automation and Johnson Controls.

We’ve got you covered on these stories and more with coverage from our affiliate site, MSSP Alert, that focus on some of the top news, trends and insights in cybersecurity for service providers. Here’s what you need to know.

Dell Confirms Cyber Hit, Denies Material Impact

Dell has been hit with a cybersecurity breach that could involve some 49 million customer records.

Reports say the threat actor said he registered with several different names on a particular Dell portal as a “partner,” ostensibly a channel partner reselling Dell equipment and services.

The hacker is said to have stolen the names and physical addresses, and perhaps other personally identifiable information (PII) of customers who have reportedly bought Dell equipment between 2017 and 2024.

Late last week, Dell sent an email message to an untold number of customers that it was “currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell.”

Click here for the full story.

Microsoft, Apple and Adobe Issue Security Updates: CISA

The Cybersecurity and Infrastructure Security Agency (CISA) released a flurry of security updates and vulnerability announcements between May 14-15.

CISA urged users and administrators to review the advisories and apply the necessary updates, as a cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.

CISA has added two new Microsoft vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. Microsoft has released security updates to address vulnerabilities in multiple products to the Microsoft Security Update Guide for May.

Apple also released security updates to address vulnerabilities in Safari, iOS, iPadOS, macOS, watchOS and tvOS.

Adobe has released security updates to address vulnerabilities in Adobe software including Adobe Acrobat and Reader, Adobe Illustrator, and Adobe Dreamweaver, among others.

CISA released four industrial control system advisories including from Rockwell Automation and Johnson Controls.

Click here for the full story and a listing of all the vulnerabilities.

Accenture Teams with Mandiant, Palo Alto Networks and US Navy

Technology giant Accenture, an MSSP Alert Top 250 MSSP, is partnering with threat intelligence specialist Mandiant, part of Google Cloud, on a new cybersecurity initiative.

Accenture will deploy the Mandiant Threat Intelligence platform while tapping Mandiant’s Cyber Resilience services to help customers gain better insights and understanding of cyber threats and vulnerabilities specific to their businesses and recover from incidents more efficiently.

As an expansion of the partnership, Mandiant Threat Intelligence is now embedded in Accenture’s Adaptive Managed Extended Detection and Response (MxDR) service with Google Chronicle Security Operations.

Accenture and Mandiant are currently helping a major public sector organization in the Netherlands to significantly improve its cybersecurity operations. Over the next five years, Accenture and Mandiant will provide the organization’s cybersecurity services, including MxDR, incident response and remediation services and generative AI embedded capabilities.

Click here for the full story.

Hackers Hit Dropbox’s Signature Tool for PII Data

Dropbox was recently hit by a cyberattack on its Sign tool, the company’s electronic signature instrument, previously known as HelloSign. The tool enables users to prepare, sign, send and track legally binding e-signatures remotely.

Dropbox said that an unauthorized threat actor had gained access to its production environment and pilfered personally identifiable information (PII), including email addresses, usernames, phone numbers, hashed passwords and data on general account settings and authentication information, such as API keys, OAuth tokens and multi-factor authentication.

The hack occurred fast on the heels of Dropbox’s Q1 2024 financial results, in which the company reported in an 8-K filing, dated May 9, 2024, a 3.3% year-over-year uptick in revenue to $631 million and a 91% rise in net income to $132 million.

In a separate 8-K filing dated April 29, Dropbox said the cyber incident has not had a material impact on the company’s overall business operations given its "current understanding" of the event. In compliance with Securities and Exchange Commission (SEC) reporting of material cyber incidents, the company said it had notified regulatory authorities and users.

Click here for the full story.

Nuspire: LockBit Ransomware on the Rise Again

Despite the U.S. Department of Justice's disruption of LockBit's operations on February 20, 2024, the group's acts of extortion experienced only a temporary decline before rapidly recovering. The result was a 1.74% increase in LockBit's acts of extortion by the end of Q1 2024 compared to Q4 2023.

This news comes via the Q1 2024 Cyber Threat Report from Nuspire, an MSSP specializing in managed detection and response (MDR) and managed endpoint detection and response (EDR) solutions.

The report spotlights a 3.69% rise in ransomware activities from Q4 2023, punctuating the persistent threat ransomware groups pose.

Additionally, Nuspire reports that dark web market activity saw a “staggering” 58.16% increase in listings, indicating significant growth in the trade of stolen data and illicit goods.

Click here for the full story.

Jessica C. Davis

Jessica C. Davis is editorial director of CyberRisk Alliance’s channel brands, MSSP Alert, MSSP Alert Live, and ChannelE2E. She has spent a career as a journalist and editor covering the intersection of business and technology including chips, software, the cloud, AI, and cybersecurity. She previously served as editor in chief of Channel Insider and later of MSP Mentor where she was one of the original editors running the MSP 501.