RansomHouse Ransomware Breach: Trellix Internal Services Exposed
RansomHouse, a known ransomware operation, has claimed responsibility for a breach at Trellix, a prominent cybersecurity vendor. The group posted several screenshots on a dark‑web forum that appear to show unauthorized access to internal Trellix services, including an administrative console, an internal Active Directory environment, and a VPN gateway. The images, timestamped and bearing the group’s distinctive branding, suggest that the attackers were able to retrieve database backups and potentially exfiltrate source code and customer data.
According to the posts, the initial foothold was obtained through a spear‑phishing email that harvested credentials for a privileged account, which then allowed the threat actors to move laterally and escalate privileges. The screenshots also reference a misconfigured internal file‑sharing service that could have facilitated the data transfer. Trellix confirmed that it detected the intrusion, engaged its incident‑response team, and is conducting a forensic investigation to determine the scope of the compromise.
The breach highlights a growing trend of ransomware groups targeting security‑focused organizations, leveraging the trust these firms command to amplify the impact of their extortion schemes. Security analysts warn that the exposure of Trellix’s internal tools could give attackers insights into the company’s detection mechanisms and potentially affect downstream customers who rely on Trellix’s products. The company has urged users to monitor for unusual activity, rotate credentials, and apply the latest patches as the investigation continues.