Compromised Mimecast Certificates Used to Target M365

NJCCIC Alert

Original Release Date: 1/14/2021

Summary

Mimecast, an email security provider used by organizations worldwide, was alerted to an attack in which a sophisticated threat actor compromised an authentication certificate. This certificate is used by approximately 10 percent of Mimecast customers to authenticate Mimecast Sync and Recover, Continuity Monitor, and IEP products to Microsoft 365 Exchange Web Services. Microsoft investigators who informed Mimecast of the attack indicated that a small number of customers’ Microsoft 365 tenants were targeted. Investigators have not disclosed any connection to the SolarWinds incident at the time of this writing.

Recommendations

The NJCCIC urges Mimecast customers using the compromised certificate to follow guidance put forth in the Mimecast blog post and immediately delete the existing connection within their Microsoft 365 tenant. Customers may reestablish a certificate-based connection using a new certificate provided by Mimecast. Additional reporting can be found in the ZDNet article.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.