Smart Office
Russia
North-West Federal District of the Russian Federation
St. Petersburg
197348, st. Aerodromnaya, 6, of. 219,
Top managers:
Furkatov Mikhail Yuryevich
Content |
The company's solutions are IT outsourcing (subscriber computer service) based on a terminal server.
History
2024: Hacking by Hackers
On May 29, 2024, it became known about a large-scale hacker attack on the Russian IT company Smart Office, specializing in server maintenance and the implementation of 1C software products. Cybercriminals hacked the company's information systems from May 24 to May 25, 2024, as a result of which numerous Smart Office customers had serious problems accessing 1C software products and working as usual.
According to official information published on the Smart Office website, the attackers managed to gain illegal access to the company's servers and encrypt all available information with their own malicious software, including confidential customer data that was on the servers of the cloud service. The company has already issued a warning to its customers about the occurrence of force majeure circumstances and is working hard to restore the infrastructure as soon as possible.
According to RBC, the same group of hackers who previously paralyzed the work of a large logistics company SDEK may be involved in the attack on Smart Office. This is evidenced by the coincidence of the encryptors used by cybercriminals.
In turn, representatives of 1C said that the attack on Smart Office did not affect the operation of its own 1C servers and did not affect customers using the cloud services of the company itself:
As a result of this computer incident, the resources of 1C and users working in the clouds of 1C themselves were not affected. |
As explained in the press service of 1C, Smart Office is one of the numerous partners of the company for the distribution and implementation of 1C: Enterprise products, but uses its own infrastructure and servers for this, providing access to its customers. 1C itself is not directly related to this infrastructure and is not responsible for its security.[1]