
The RansomHouse ransomware group has claimed responsibility for the recent cyberattack on cybersecurity company Trellix, following the company’s disclosure that part of its source code repository had been breached. The hacking group reportedly published screenshots online to demonstrate access to internal Trellix systems and services.
Trellix confirmed earlier this week that attackers had gained unauthorized access to a portion of its source code repository. However, the company stated that its ongoing investigation has found no evidence suggesting that its source code release or distribution processes were compromised or that the exposed code had been exploited.
So far, Trellix has not shared detailed technical information regarding how the attackers breached its systems or exactly what data may have been accessed. The company said it is continuing its investigation with the help of external cybersecurity experts and plans to release more information once the investigation is complete.
RansomHouse is a ransomware and extortion group known for targeting organizations across multiple industries. Unlike traditional ransomware operators, the group often focuses on data theft and extortion rather than encrypting systems. The hackers typically pressure victims by threatening to leak stolen information publicly if ransom demands are not met.
The incident has drawn attention because Trellix itself is a major cybersecurity company formed through the merger of FireEye and McAfee Enterprise in 2022. The company provides threat detection, endpoint security, incident response, and enterprise cybersecurity solutions to organizations globally.
Security experts noted that attacks against cybersecurity vendors are particularly concerning because such companies often have access to sensitive threat intelligence, security tools, and enterprise infrastructure. The breach also highlights the growing trend of ransomware groups increasingly targeting software vendors, cloud platforms, and security providers as part of broader supply chain attack strategies.




