US managed service provider CompuCom was the victim of a cyberattack that partially disrupted its services and some of its operations. Even if the company initially did not provide technical details about the attack, security experts speculated the involvement of ransomware due to the observed effects.
The provider is a wholly-owned subsidiary of The ODP Corporation, it provides Managed Workplace Services including IT solutions and hardware and software resale, integration, and support services.
“Certain CompuCom information technology systems have been affected by a malware incident which is affecting some of the services that we provide to certain customers. Our investigation is in its early stages and remains ongoing. We have no indication at this time that our customers’ systems were directly impacted by the incident.” reads the statement launched by the company.
“As soon as we became aware of the situation, we immediately took steps to contain it, and engaged leading cybersecurity experts to begin an investigation. We are also communicating with customers to provide updates about the situation and the actions we are taking. We are in the process of restoring customer services and internal operations as quickly and safely as possible. We regret the inconvenience caused by the interruption and appreciate the ongoing support of our customers.“
CompuCom confirmed that its systems were infected with malware that impacted its services, the provider immediately launched an investigation into the incident.
At the time of this writing, the ongoing investigation did not provide any evidence that customers’ systems were directly impacted by the attack.
CompuCom later shared a ‘Customer FAQ Regarding Malware Incident’ that provides additional technical details about the attack, such as the use of Cobalt Strike beacons on several systems in their environment.
“Based on our expert’s analysis to date, we understand that the attacker deployed a persistent Cobalt Strike backdoor to several systems in the environment and acquired administrative credentials,” the CompuCom FAQ reads, according to BleepingComputer. “These administrative credentials were then used to deploy the Darkside Ransomware.”
DarkSide Ransomware gang usually steals data before encrypting the victims’ systems, which means that it is possible that the threat actors have also exfiltrated company data.
At the time of this writing, the data from CompuCom has yet to be published on the DarkSide gang’s leak site.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
(SecurityAffairs – hacking, CompuCom)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.