Ransomware Group Takes Credit for Trellix Hack
RansomHouse claims responsibility for breach of Trellix source code repository.
Summary
The RansomHouse ransomware group has claimed responsibility for a breach of cybersecurity firm Trellix's source code repository, publishing screenshots showing access to internal services and management dashboards. Trellix confirmed the breach but stated no evidence of source code exploitation or malicious distribution was found. The timing suggests a possible connection to concurrent supply chain attacks attributed to TeamPCP and Lapsus$ targeting other security vendors.
Full text
The RansomHouse ransomware group has taken credit for the recent attack on the cybersecurity firm Trellix. The Trellix hack came to light this week when the company announced on its website that part of its source code repository had been breached. “Based on our investigation to date, we have found no evidence that our source code release or distribution process was affected, or that our source code has been exploited,” the company stated. No other information has been shared by Trellix, but it has promised to release additional details after it completes its investigation. RansomHouse claims Trellix hack The RansomHouse group named Trellix on its leak website on Thursday. The hackers have not specified how much data they stole from the cybersecurity company, but have published several screenshots that appear to show they had access to internal services and management dashboards. The hackers have not made any claims regarding the type of data they have stolen from Trellix. When the incident came to light, SecurityWeek reported that the timing of the attack suggested a potential connection to the recent supply chain attack linked to the hacker groups TeamPCP and Lapsus$. This campaign has impacted several cybersecurity firms, including Checkmarx, Aqua Security, and Bitwarden. Advertisement. Scroll to continue reading. The connection has yet to be confirmed, but it’s worth noting that TeamPCP has reportedly partnered with ransomware groups. SecurityWeek has reached out to Trellix for comment and will update this article if the company responds. RansomHouse is an extortion group that emerged in 2022, primarily operating as a ransomware-as-a-service (RaaS) provider that targets large enterprises. The group has been known to encrypt victims’ files and steal valuable data to increase its chances of receiving a ransom payment. RansomHouse’s Tor-based leak website currently lists more than 170 victims. Related: Vendor Says Daemon Tools Supply Chain Attack Contained Related: Security Firm Aura Discloses Data Breach Impacting 900,000 Records Related: Taiwan Security Firm Confirms Flaw Flagged by CISA Likely Exploited by Chinese APTs Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Claude AI Guided Hackers Toward OT Assets During Water Utility IntrusionRomanian Man Extradited to US for Role in Hacking Scheme 17 Years AgoCISA Launches ‘CI Fortify’ to Prepare Critical Infrastructure for Geopolitical Cyber ConflictPalo Alto Networks to Patch Zero-Day Exploited to Hack FirewallsMicrosoft Warns of Sophisticated Phishing Campaign Targeting US OrganizationsCritical Remote Code Execution Vulnerability Patched in AndroidWhatsApp Discloses File Spoofing, Arbitrary URL Scheme VulnerabilitiesTrellix Source Code Repository Breached Latest News Vulnerability in Claude Extension for Chrome Exposes AI Agent to TakeoverIvanti Patches EPMM Zero-Day Exploited in Targeted AttacksWorries About AI’s Risks to Humanity Loom Over the Trial Pitting Musk Against OpenAI’s LeadersPalo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingBoost Security Raises $4 Million for SDLC Defense PlatformClaude Code OAuth Tokens Can Be Stolen Through Stealthy MCP HijackingChrome 148 Rolls Out With 127 Security FixesAttackers Could Exploit AI Vision Models Using Imperceptible Image Changes Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveSumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.John Hernandez has joined BlueVoyant as Chief Executive Officer.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email