![]() ![]() We also have evidence that a threat actor exfiltrated an encryption key for a portion of the encrypted backups. Our investigation to date has determined that a threat actor exfiltrated encrypted backups from a third-party cloud storage service related to the following products: Central, Pro,, Hamachi, and RemotelyAnywhere. I am writing to update you on our ongoing investigation about the security incident we told you about in November 2022. We take our commitment to protect our customers very seriously and will continue to undertake efforts to ensure our services and infrastructure remain secure and are designed to detect and prevent future threats. Thank you for your continued patience and understanding while we completed the investigation. Comprehensive reviews of and, where appropriate, enhancements to our encryption practices within our applications and backup infrastructure.Full analysis of existing controls and configurations, and necessary changes to further harden existing environments.Accelerated the migration of customer accounts onto our enhanced Identity Management Platform.We are constantly enhancing our security measures and monitoring capabilities to protect our customers, including: In addition, we concluded that GoTo Resolve, GoTo Connect, GoTo Meeting, GoTo Webinar, GoTo Contact Center, GoTo Assist, GoTo Training, and Grasshopper had no impact at all. ![]() We eliminated the threat actor’s access to the environment and found no evidence of additional compromise or threat actor activity beyond what we previously disclosed as impacted in January. We recently concluded our investigation into the security incident first shared with customers in November of 2022 regarding unauthorized activity in a third-party cloud storage environment.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |