On Tuesday, Russian anti-malware firm Physician Net (Dr.Net) disclosed a security breach after its techniques had been focused in a cyberattack over the weekend.
Dr.Net disconnected all servers from its inside community after detecting “indicators of unauthorised interference” to its IT infrastructure.
The corporate was additionally pressured to cease delivering virus database updates to clients on Monday whereas investigating the breach.
“The assault on our sources started on Saturday, September 14, 2024. We carefully monitored it and saved the occasions underneath management,” the corporate stated.
“The try to hurt our infrastructure was prevented in a well timed method, and no consumer whose system was protected by Dr.Net was affected,” it added in a separate assertion in English, printed on its official web site.
“Following established security insurance policies, we disconnected all our servers from the community and initiated complete security diagnostics.”
In a brand new assertion printed on Wednesday, Dr.Net acknowledged that virus database updates resumed on Tuesday and added that the security breach did not impression any of its clients.
”To analyse and get rid of the incident’s penalties, we applied a sequence of measures, together with the usage of Dr.Net FixIt! for Linux,” the corporate stated.
“The gathered knowledge allowed our security consultants to efficiently isolate the risk and be sure that our clients remained unaffected by it.”
A Dr.Net spokesperson did not reply to a request for remark when BleepingComputer reached out a number of occasions on Tuesday.
Dr.Net is the final in a sequence of Russian cybersecurity corporations focused in cyberattacks in recent times. As an illustration, pro-Ukrainian hackers Cyber Anarchy Squad breached Russian info security agency Avanpost in June and leaked what they claimed to be 390GB of information stolen earlier than encrypting over 400 digital machines.
Kaspersky additionally revealed in June 2023 that iPhones on its community had been contaminated with adware by way of iMessage zero-click exploits that focused iOS zero-day bugs as a part of a marketing campaign now often called “Operation Triangulation.”
The corporate stated on the time that the assaults, which affected its Moscow workplace and workers in different international locations, began in 2019 and had been nonetheless ongoing.