Verint Victimized By Ransomware

By: Dan Gelinas, Published on Apr 18, 2019

Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was infected with malware, the company confirmed to IPVM.

In this note, based on our research and discussion with Verint, we look at the following questions:

  • Who is affected?
  • What was the ransomware and how does it work?
  • What is being done to address the current issue?
  • What is being done to ensure it will not happen again?

******, ***** ** **** known ** *** ******** security ******** *** ***** surveillance *** *** ***** a******** ************* ********** ****, *** ******** with *******, *** ******* confirmed ** ****.

** **** ****, ***** on *** ******** *** discussion **** ******, ** look ** *** ********* questions:

  • *** ** ********?
  • **** *** *** ********** and *** **** ** work?
  • **** ** ***** **** to ******* *** ******* issue?
  • **** ** ***** **** to ****** ** **** not ****** *****?

[***************]

****** ********* ** **** that ***** *** * malware ********, ************* ***** published ******* **** ******* news **************,*********, *********. ***** ******* ******* a ****** ****** ** millions ** *******.

*** ** ** **** a **-****-*** ******* **** a ****** ***** ** cybersecurity *** ******** **** malware?

Input **** ******

****** ******* ********* *** attack ********, *** "*********" and **** ****** **** back ** "******":

*** ****** *** ********** early, ********* *******, *** we *** **** ** normal **********.

The ********** ***-**

********* ** *** ********* reports, * ******** ** a ******** ****** ***** circulating ****** ** ***** 17th. *** ******* **** that "***** ** ********* a ******** ***** ********* the ** ******* *****," asking ********* ** **** off ***** ********* *** contact *** ** ******** if **** *** * ransomware ***-**, ** ***** below:

Ransomware ****

*** ****** ********* **** ***** ******* say *** ********** **** was **** ** ****** is ****** **** *** originates **** ***** *****:

******************* **** ************ *:

******** *** ******** ******* enterprises, ***** ********** ******** of **, ******* *** data ******* ** **** infected *******.

** **** *** **** and ********** ** *******, then ****** *** ********** targeted, ** ********** ********:

**** ** **** *********** for ******** *******. ** fact, *** ********** ****** is ************* ***** *** small-scale **********, **** **** only ******* ****** *** resources *** ******** ** each ******** ******* **** its ********* *** ************ carried *** ******** ** the *********.

****** **** *** ********** writes ***** ** ******* computers:

******* ***** *** **** written ** * *********, depending ** *** ******* of ******* ** ******’* computer. ** *** ******* is ******* ** ** Windows ****, *** **** is ******* ** *** directory “\********* *** ********\******* User\”, ********* ** ** created ** “\*****\******\”.

Who *** ********?

********* ** *** *****-********* reports, *** ********** ******** the ******-***** ****** ** Verint. ****** ** ************* in *** **** *** also*** **** ******* ********** the ********, *** *** EMEA *** **** *******.

****'* ********* ** ****** about ******* ** *** other ******* **** ******** or ******* ** *** any ****** ********* **** affected **** *** **** addressed.

****** ** * ***** organization **** * *** reach ** **** ***** in *** ********** **** the "***** ******" ******* of ****** ******* ** ***** site:

What ****** *** ****

********* ******* *** ** line **** ******'* ***** statement ** ****, ********* stating **** ****** **** the ****** *********** *****, ******** **** taken *** *** ****** was "********"** **** *****:

*******, ***** **** ******* go ** ** *** that *** ****** *** "fierce" ** ****** *** that "******" *** **** to ******'* *******:

***** ******* ****** *** any ** *** ********* reports **** ******** ******* on *** ****** ** damage,*** ***** ** *** Marker ***** *** ******** necessity ** ****** ** disclose*** ****** ** ************. Such * ********** ***** be ******** ** *** company's **********:

*** ******** ***** ***** the *******'* ***** *********** is *********** ********* ** this ****:

Revenue - ***** ************ ** *************

***** ****** ********* ** market ************ ** ***** surveillance ***** (***** ** its ****** ********* *** customer ****), *** ******* has ****************** * ************* ********

** * ******* *****, cyber ************ ******* ** $400+ ******* ********, ** the ******* ********* **** *** *****:

****** ******* ******** *** video ************ ******* ******* a *** ***** **** and ** **** **** it *** ** *** $100 ******* *****.

Guarding ******* ****** *********

****** *** *** ******* to ****'* ********* ***** what ** ***** **** to ****** **** ** attack **** *** ****** again.

Comments (4)

*'* * ****** ******* what *** ******* ***** by "* ********** *** up". ********* ** ********** and******, **** **** ****** ransom ***** ** **** files ***** *********.

***** **#*. *** *** of *** **** "********** pop-up" *** ***** ** Verint's ******* ** *** employees ******** **** **** to **. ** ***, Verint *** **** ************ to ******* ********* ****** the ***** ********* ****** in *** *****. * will *** **** ** elaborate ***** ** **** observation *** **** ****** when/if * **** **** from ****.

*****, * ****** **** anti ***** **** *** internally. * **** ** work ** ** ** a ****** ***** *** got *** **** * Crytolocker ***** **** ** the *** **** **** were ***. *’** **** very ******* ** ** Security *** ****** ***** then.

** ***’** ******* ** protect **** *******, **’* and ******* * ***** recommend **** ** ** Antivirus (*** **** ******* who *** ************ ****** VB100 ***** *** ***** participates) *** *** * Synology *** **** ***** Active ****** *** ******** suite, ********* **’* **** and ** ******** **** based *******, ********* *** Data ************* (***** ** average ** **% *** me).

 

******... /********, *** ***** keep ***** ***'* ** check ********** ** ** was ********* ******** ********.

*** * **** ***** Verint ** ***** *** wireless ***** **** ************/*********...**** those **** *** ****. Have *** **** **** since.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Wyze Massive Data Leak on Dec 26, 2019
Wyze has exposed millions of user's data, as reported by Twelve Security, and confirmed by IPVM, who has spoken with Twelve Security and reviewed...
Dahua New Critical Vulnerability 2019 on Sep 23, 2019
Dahua has quietly admitted 5 new vulnerabilities including 1 critical vulnerability with a 9.8 / 10.0 CVSS score and 2 high vulnerabilities (scored...
ONVIF Exposure To "Devastating DDoS Attacks" Examined on Sep 06, 2019
ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices. And after an...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...
Dahua Wiretapping Vulnerability on Aug 02, 2019
IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been...
Alarm.com Suffers Outage on Jul 26, 2019
Alarm.com suffered a major outage this week, impacting its 5+ million customers. Inside, we examine what happened, what Alarm.com told IPVM and...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Subnetting for Video Surveillance on Apr 30, 2019
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...

Most Recent Industry Reports

Embedded Logix Thermal Temperature Detection System Examined on Apr 08, 2020
Embedded Logix has been producing thermal temperature measurement systems for industry and fire detection for over 10 years. Now, they are entering...
Micron 1 TB SD Cards Aim To Eliminate NVRs on Apr 08, 2020
Micron has boldly proclaimed their latest 1TB microSD "eliminates the need for network video recorders", targeting the growing market of...
US DoD Declares "Can No Longer Do Business" With Contractors Using Dahua, Hikvision, Huawei on Apr 08, 2020
The US Department of Defense has confirmed to IPVM that they fully support and intend to proceed with the NDAA 'blacklist clause' covering Dahua,...
IPVM's 12th Anniversary - Thank You! on Apr 07, 2020
IPVM is proud to celebrate it's 12 anniversary expanding our commitment to providing the industry independent and objective information on video...
Mobotix Thermal Body Temperature Detection Examined on Apr 07, 2020
Mobotix has jumped into the Coronavirus temperature detection market, but how do they compare to thermal incumbents like FLIR or ICI who have been...
Verkada Coronavirus Response: Free Temp Systems For Government and Health Care on Apr 07, 2020
Verkada has built a reputation on giving away things for free - free Yeti Tumblers, free trial cameras and now free temporary systems for...
Hikvision USA Refuses, Dahua USA Drives Forward With "Coronavirus Cameras" on Apr 07, 2020
Both have been federally banned, both sanctioned for human rights abuses but only one - Dahua - is taking aim at the booming "coronavirus cameras"...
China Surveillance Vulnerabilities Being Used To Attack China, Says China on Apr 07, 2020
While China video surveillance vulnerabilities have been much debated in the West in the past few years, China is now saying those vulnerabilities...
USA ICI Elevated Skin Temperature Detectors Examined on Apr 06, 2020
Infrared Cameras, Inc. (ICI) is aiming to help slow the spread of COVID-19 with "pinpoint accurate skin temperature measurement" using their...
Trade Groups Request NDAA Blacklist Delay Citing Coronavirus on Apr 06, 2020
Two trade groups representing government contractors have asked Congress to delay implementation of the NDAA's 'blacklist' clause from this August...