Mitiga Investigates, Remediates Breach through Third-Party Plugin 

One of Mitiga’s customers, a global company in the eCommerce industry, identified a breach in their environment. A developer at the company had installed a code analytics plugin from GitHub marketplace to try it out, then forgot to remove access. The third-party plugin was later hacked, but ten months elapsed between detection of that breach and notification to users of the plugin. It took a further ten days to notify affected customers of the compromise. This allowed attackers considerable time to access our customer’s code. It was essential to quickly evaluate the potential impact.
  • Breach investigation faster than humanly possible
  • IR² subscription, including zero cost critical incident response
  • Continuous, proactive breach investigation
itiga supplied guidance on the potential effect of installing third-party plugins, managing the permissions of those plugins, and tracking plugin use to ensure that unused plugins are removed to reduce potential risks.

To read the case study today, fill out this short form:

  • Breach investigation faster than humanly possible
  • IR² subscription, including zero cost critical incident response
  • Continuous, proactive breach investigation