Software company OSIsoft recently warned employees, interns, consultants and contractors that all domain accounts have likely been compromised as a result of a data breach.
OSIsoft provides real-time data management solutions and it’s best known for its PI System product, which allows organizations to collect, analyze and visualize data that can be used to improve processes, compliance, safety, security and other operations. The company has over 1,000 employees and its product has more than 20,000 deployments across 127 countries.
In a breach notification submitted last week to the Office of the Attorney General in California, OSIsoft revealed that hackers used stolen credentials to remotely access some of its systems. While the company has found evidence of malicious activity on 29 devices and 135 accounts, it believes all OSI domain accounts are impacted.
“You should assume your OSI domain logon account name, as well as email address and password have been compromised,” the company told impacted individuals. “Although Active Directory (AD) uses cryptographic protection methods, your personal credentials may have been breached. If you configured your external accounts to use OSIsoft email address for password recovery, re-used a previous OSIsoft password, or there is a systemic pattern with external accounts, you are at a higher risk of credential theft.”
OSIsoft says the investigation into the incident continues. In the meantime, the company claims it has created a comprehensive remediation strategy in case unauthorized activity escalates during its investigation, and it has deployed “important security measures.”
When companies submit breach notifications to the Office of the Attorney General, they are asked to specify when the breach took place – if the information is known. Interestingly, OSIsoft listed eight different dates between March 23, 2017, and July 26, 2018, which suggests that the attackers may have had access to its systems for well over a year.
Impacted individuals have been instructed to change passwords on external services if they were the same as for their OSI account, report suspicious activity to the IT team, and disable or restrict remote access and file sharing features on their devices. Compromised passwords are being reset.