Security

Cyber-crime

New Relic's cyber-something revealed as attack on staging systems, some users

Ongoing investigation found evidence of stolen employee creds and social engineering


Nine days after issuing a vaguely worded warning about a possible cyber security incident, web tracking and analytics outfit New Relic has revealed a two-front attack.

One front was the vendor's staging systems, which it has admitted were compromised in mid-November after an "unauthorized actor used stolen credentials and social engineering in connection with a New Relic employee account."

The invader was "able to view certain data pertaining to our customers' use of New Relic," the vendor's advisory explains.

"There is no indication of lateral movement from our staging environment to any customers' New Relic accounts in the separate production environment or to New Relic's production infrastructure," the advisory adds.

The second front is … you, possibly.

"Over the course of our investigation, we observed similar indicators of compromise (IOCs) accessing a small number of customers' New Relic accounts," the advisory reveals.

New Relic has, therefore, rotated passwords and removed API keys for accounts it believes may have been attacked.

"Based on our investigation to date, there is no evidence to suggest the identified log-in credentials were acquired as a result of the attack on New Relic's staging environment," the advisory states. Instead, the creds were "harvested in recent large-scale social engineering and credential compromise attacks, which may have put these New Relic user accounts at risk."

Customers whose use of New Relic was detailed in data in the staging environment, and/or whose accounts may have been probed, will hear from the analytics outfit about what to do next.

New Relic hasn't said the advisory is the last word on the matter. Indeed, the December 1 update is described as being the result of "considerable progress in our investigation" that put the business "in a more informed position to share with our customers additional details about the ongoing investigation and what we have learned." The investigators continue to work with third party infosec consultants and forensics firms "to unpick the incident."

The vendor has already made some changes, revealing that its security team has "taken steps to implement additional layers of technical controls, enhance network access controls, and eliminate the attack method used to access New Relic's staging environment."

"We have taken this opportunity to further harden access controls and credential theft defenses, leveraging an industry-leading security toolset," the advisory continues, adding that New Relic has "increased capacity to monitor security across our entire enterprise, all in order to ensure comprehensive visibility into our security posture." ®

Send us news
1 Comment

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media

Also: NXP China attack, Australia can't deliver on ransom payment ban (yet), and Justin Sun's very bad month

2.5M patients infected with data loss in Norton Healthcare ransomware outbreak

AlphV lays claims to the intrusion

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Latest offensive cyber group to switch to atypical programming for payloads

That call center tech scammer could be a human trafficking victim

Interpol increasingly concerned as abject abuse of victims scales far beyond Asia origins

Five Eyes nations warn Moscow's mates at the Star Blizzard gang have new phishing targets

The Russians are coming! Err, they've already infiltrated UK, US inboxes

Belgian man charged with smuggling sanctioned military tech to Russia and China

Indictments allege plot to shift FPGAs, accelerometers, and spycams

Fancy Bear goes phishing in US, European high-value networks

GRU-linked crew going after our code warns Microsoft - Outlook not good

CISA details twin attacks on federal servers via unpatched ColdFusion flaw

Tardy IT admins likely to get a chilly reception over the lack of updates

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

New Relic warns customers it's experienced a cyber … something

Users told to hold tight and await instructions as investigation continues