Reports are surfacing that indicate the website of application security vendor Barracuda Networks was compromised by a SQL injection attack.
SQL Injections exploit flaws in website applications used to interface with users, such as search query functions, and allow attackers to issue commands to the website's server and gain access to sensitive information.
The attack appears to have exposed confidential information regarding Barracuda's business partners as well as network the login credentials of several employees.
The Register UK reports that "the spilled contents also included what appeared to be the email addresses and hashed passwords of Barracuda employees authorized to log in to the company's content management system. The passwords appeared to be hashed using the MD5 algorithm that is slowly being phased out in favor of algorithms that are considered more secure alternatives. It was unclear if the hashed passwords were salted to prevent them from being cracked using various free tools available on the internet."
The basis of the report is an anonymous posting complete with a list of compromised databases and screenshots that detail some of Barracuda's clients, listing names and contact information.
Officials at Barracuda have so far declined to comment on the alleged breach.
Barracuda specializes in providing application security solutions, and news of the breach is another in a recent series of "ironic" hacks and vulnerability disclosures for some of the leading security vendors in the industry.
Late last month, researchers revealed multiple security vulnerabilities found in the McAfee.com website that leaves the company's portal susceptible to cross-site scripting (XSS) attacks and data leakage.
The revelations about the flaws in the McAfee site proved to be embarrassing because one of McAfee's specialties is scanning websites for security problems with their McAfee "SECURE" service.
Also last month RSA, the security division of EMC, announced they had suffered a breach stemming from an email-based Flash vulnerability attack that ultimately targeted proprietary information on the company's SecurID two-factor authentication systems.
SecurID is a product designed to prevent unauthorized access to enterprise network systems, and exposure of proprietary information about the product in turn made RSA's clients more vulnerable to hacks themselves.