Anatomy of a Breach

Anatomy of a Breach: Mimecast — The SolarWinds Shockwave Reaches Email Security

> series: anatomy_of_a_breach —— part: 145 —— target: mimecast —— linked_to: solarwinds_sunburst —— affected: 10%_of_customers<span class="cursor-blink">_</span>_

Hedgehog Security 31 January 2021 12 min read

SolarWinds was not the end. It was the beginning of a cascade.

In January 2021, Mimecast disclosed that a sophisticated threat actor had compromised a certificate used to authenticate several of its products — Sync and Recover, Continuity Monitor, and Internal Email Protect (IEP) — to Microsoft 365 environments. Approximately 10% of Mimecast's customer base used the compromised connection. The attack was linked to the same SolarWinds/Sunburst threat actor (Russia's SVR), demonstrating that the SolarWinds compromise was generating a cascade of follow-on attacks against the security ecosystem.

The compromise of a Mimecast authentication certificate was particularly concerning because Mimecast sits in the email path for its customers — inspecting, filtering, and processing email traffic. A compromised certificate could potentially allow the attacker to intercept email traffic between Mimecast and Microsoft 365 for affected customers. Mimecast asked all customers using the compromised certificate to delete and re-establish their connections. The incident joined RSA, Cloudflare, Imperva, and NordVPN in the growing list of security vendors compromised through supply chain attacks.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

One supply chain attack. An expanding web of compromises.

Supply Chain Attacks Cascade
SolarWinds did not end with SolarWinds — the compromised access was used to attack further targets in the security ecosystem. Mimecast, Microsoft, FireEye, and others were all affected. For UK organisations, the lesson is that a single supply chain compromise can trigger cascading breaches across your entire vendor ecosystem. <a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain security.
Certificate Compromise
The stolen certificate authenticated Mimecast's products to Microsoft 365 — meaning the attacker could potentially impersonate legitimate Mimecast services. Certificate management — including rotation, monitoring, and revocation — is a critical security control. Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses certificate management practices.
Email Security Vendor in the Email Path
Mimecast processes email for its customers — sitting between senders and recipients. Compromising Mimecast's authentication to Microsoft 365 could enable email interception at scale. When selecting email security vendors, their own security posture must be evaluated. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides email security monitoring independent of any single vendor.
Seventh Security Vendor Breached
Mimecast became the seventh security vendor breach documented in this series — joining RSA, LastPass, Hacking Team, Cloudflare, Imperva, and NordVPN. The pattern is now overwhelming: security vendors are high-value targets, and their compromise creates cascading supply chain risk. Our <a href="/penetration-testing">penetration testing</a> verifies security independently of vendor claims.

SolarWinds keeps expanding. Verify your vendor connections.

The Mimecast compromise demonstrated that major supply chain attacks generate secondary and tertiary effects that persist for months. For UK organisations, the action is clear: audit all vendor connections, rotate certificates and credentials, verify that vendor integrations are using current authentication mechanisms, and monitor for anomalous activity across vendor connections. Cyber Essentials mandates secure vendor management. Our infrastructure testing includes vendor integration assessment. SOC in a Box monitors vendor connections 24/7. And UK Cyber Defence provides the forensic capability to determine whether your organisation was affected by supply chain cascades.


SolarWinds reached Mimecast. Which of your vendors' vendors has been compromised?

Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> assesses vendor integrations. <a href="/cyber-essentials">Cyber Essentials</a> mandates supply chain security. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors vendor connections.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles