A cyber intrusion targeting the source code infrastructure of Trellix has reportedly been linked to the ransomware and extortion collectiveRansomHouse. The group recently posted several screenshots on its leak portal, allegedly showing access to internal appliance management systems belonging to the cybersecurity vendor. Although the images were shared as evidence of compromise, independent verification of the material has not yet been confirmed. Trellix, which serves thousands of enterprise customers worldwide, acknowledged the security incident earlier this month and stated that unauthorized access had been identified within a limited section of its source code repository. The company added that incident response and forensic specialists were immediately engaged to investigate and contain the breach. In its official response, Trellix explained that there was currently no indication that its software release mechanisms or source code distribution channels had been tampered with. The company also stated that no evidence had surfaced showing active exploitation of the accessed code. Law enforcement authorities were reportedly informed as part of the response process. After fresh claims from RansomHouse surfaced online, Trellix confirmed it was reviewing the threat actor’s statements and continuing its investigation. According to the attackers, the compromise allegedly began on April 17 and included encryption activity affecting internal systems. However, the full extent of the incident remains unclear while the inquiry continues. RansomHouse emerged in 2022 as a data extortion operation focused on stealing and exposing sensitive corporate information through dark web leak platforms. Over time, the group expanded its capabilities by incorporating advanced encryption tools into its operations. Among these utilities are “Mario,” a ransomware variant designed to apply dual-layer encryption using separate keys, and “MrAgent,” a deployment framework used to automate attacks against VMware ESXi environments. The group has previously been associated with several major cyber incidents, including an attack on Askul Corporation, where hundreds of thousands of customer records were reportedly compromised. Trellix has stated that additional information regarding the ongoing investigation may be disclosed once more details become available.
Hackers linked to the ShinyHunters extortion group have claimed responsibility for a data breach affecting Spanish fashion retailer exposing information belonging to more than 197,...
Cybersecurity researchers have uncovered a large-scale Android scam campaign involving fraudulent “call history” applications distributed through the Google Play Store. The mal...
Multiple high-severity vulnerabilities have been identified in React Server Components (RSC) and Next.js App Router implementations, exposing web applications to Remote Code Execut...