U.S. web tracking and analytics firm New Relic had its internal environment for hosting customer usage data and other logs impacted in a recent cyberattack, SecurityWeek reports.
Social engineering and stolen employee account credentials have been leveraged by attackers to infiltrate the internal environment, which enabled access to some customer accounts, according to New Relic, which emphasized that the intrusion did not result in any lateral movement and the compromise of credentials stored in the affected environment. "It appears the credentials were harvested in recent large-scale social engineering and credential compromise attacks, which may have put these New Relic user accounts at risk. In cases where we identify this suspected access, we are proactively reaching out to these customers," said New Relic. Such an attack has prompted New Relic to not only strengthen its network defenses but also urge its users to activate multi-factor authentication and track their accounts for suspicious activity.
Identity, Decentralized identity and verifiable credentials
New Relic confirms internal environment hack
Share
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Related Terms
Access MatrixBasic AuthenticationBiometricsCertificate-Based AuthenticationChallenge-Handshake Authentication Protocol (CHAP)Digest AuthenticationDigital CertificateDiscretionary Access Control (DAC)Get daily email updates
SC Media's daily must-read of the most current and pressing daily news