Software company OSIsoft recently warned employees, interns, consultants and contractors that all domain accounts have likely been compromised as a result of a data breach.
OSIsoft provides real-time data management solutions and it’s best known for its PI System product, which allows organizations to collect, analyze and visualize data that can be used to improve processes, compliance, safety, security and other operations. The company has over 1,000 employees and its product has more than 20,000 deployments across 127 countries.
In a breach notification submitted last week to the Office of the Attorney General in California, OSIsoft revealed that hackers used stolen credentials to remotely access some of its systems. While the company has found evidence of malicious activity on 29 devices and 135 accounts, it believes all OSI domain accounts are impacted.
“You should assume your OSI domain logon account name, as well as email address and password have been compromised,” the company told impacted individuals. “Although Active Directory (AD) uses cryptographic protection methods, your personal credentials may have been breached. If you configured your external accounts to use OSIsoft email address for password recovery, re-used a previous OSIsoft password, or there is a systemic pattern with external accounts, you are at a higher risk of credential theft.”
OSIsoft says the investigation into the incident continues. In the meantime, the company claims it has created a comprehensive remediation strategy in case unauthorized activity escalates during its investigation, and it has deployed “important security measures.”
When companies submit breach notifications to the Office of the Attorney General, they are asked to specify when the breach took place – if the information is known. Interestingly, OSIsoft listed eight different dates between March 23, 2017, and July 26, 2018, which suggests that the attackers may have had access to its systems for well over a year.
Impacted individuals have been instructed to change passwords on external services if they were the same as for their OSI account, report suspicious activity to the IT team, and disable or restrict remote access and file sharing features on their devices. Compromised passwords are being reset.
Related: Flaw Found in OSIsoft Product Deployed in Critical Infrastructure Sectors
Related: OSIsoft Patches Flaws in PI Server, Web API Products

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
Latest News
- What if the Current AI Hype Is a Dead End?
- Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security
- Zyxel Urges Customers to Patch Firewalls Against Exploited Vulnerabilities
- Gigabyte Rolls Out BIOS Updates to Remove Backdoor From Motherboards
- SBOMs – Software Supply Chain Security’s Future or Fantasy?
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
