8 February 2021

Cybersecurity firm Stormshield says hackers stole source code for its SNS product


Cybersecurity firm Stormshield says hackers stole source code for its SNS product

France-based cybersecurity firm has disclosed a security incident, in which malicious actors gained an unauthorized access to a technical portal used by customers and partners to manage tech support tickets related to the company’s products. The intruders may have gained access to “personal data and technical exchanges” associated with a number of customer accounts.

Stormshield is a wholly-owned subsidiary of Airbus CyberSecurity and a major provider of network security products to the French government, NATO, and defense agencies throughout the world.

The company said it has already informed all affected customers of a data breach and notified the French authorities. As a precaution, the passwords of all accounts were reset and we applied additional measures to the portal in order to reinforce its security.

The investigation into the incident revealed that some parts of source code from the SNS (Stormshield Network Security) and Stormshield Network Security Industrial Firewall products were stolen.

“At this stage of the investigations conducted by Stormshield and ANSSI, there is nothing to conclude that the source code of the product held by the company has been altered by the attacker,” the French National Agency for the Security of Information Systems (ANSSI) said in a statement.

“Although the incident has no immediate operational impact for its customers, Stormshield has published an update that we recommend that you apply as a precaution. Furthermore, for the duration of the investigations and also as a precautionary measure, ANSSI has decided to place the qualifications and approvals of SNS and SNI products under observation,” the agency said.

Back to the list

Latest Posts

Cyber Security Week in Review: April 19, 2024

Cyber Security Week in Review: April 19, 2024

In brief: the LabHost PhaaS platform shut down, Russian military hackers attacked critical infrastructure in the US and Europe, and more.
19 April 2024
Ukrainian military personnel targeted via messaging apps and dating sites

Ukrainian military personnel targeted via messaging apps and dating sites

The threat actor employs a range of software in their malicious activities, including both commercial programs and  open-source tools.
18 April 2024
Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

Russian military hackers targeted US water utilities and hydroelectric facilities in Europe

This marks the first time Russian nation-state hackers have posed a direct threat to critical infrastructure in Western countries.
18 April 2024