Trustwave Holdings

{{More citations needed|date=November 2020}}

{{Infobox company

| name = Trustwave Holdings, Inc.

| logo = Trustwave logo Color.png

| logo_size = 200px

| logo_alt =

| logo_caption =

| logo_padding =

| image =

| image_size =

| image_alt =

| image_caption =

| trade_name = Trustwave

| former_name =

| type = Subsidiary

| traded_as =

| ISIN =

| industry = {{ubl|Managed Security Services|Information Security|Cloud computing}}

| fate =

| predecessor =

| successor =

| founded = {{Start date and age|1995}}

| founder =

| defunct =

| hq_location =

| hq_location_city = Chicago, Illinois

| hq_location_country = United States

| coordinates =

| num_locations =

| num_locations_year =

| area_served = Worldwide

| key_people = Eric Harmon (CEO){{Cite web|url=https://www.trustwave.com/en-us/company/about-us/leadership/|title=Trustwave Leadership}}

| production =

| production_year =

| revenue = US $216 million {{cite web | url = https://www.reuters.com/article/us-singtel-m-a-trustwave-idUSKBN0MY2C820150408| title = Singtel buying U.S. cyber security firm Trustwave for $810 million| last = Aravindan| first = Aradhana| date =7 April 2015 | publisher = Reuters| access-date= 9 April 2015}}

| revenue_year = 2014

| operating_income =

| income_year =

| net_income =

| net_income_year =

| aum =

| assets =

| assets_year =

| equity =

| equity_year =

| owner =

| members =

| members_year =

| num_employees = 1,600+ {{cite web | url = https://www.trustwave.com/Company/About-Us/Our-Story/| title = Trustwave: Our Story| access-date= 25 May 2016}}

| num_employees_year =

| parent = {{ubl|Singtel {{smaller|(2015–24)}}|The Chertoff Group {{smaller|(2024–present)}}}}

| divisions =

| subsid =

| module =

| website = {{URL|www.trustwave.com}}

| footnotes =

| intl =

}}

Trustwave Holdings, Inc. is an American{{Cite web|url=https://www.zdnet.com/article/singtel-acquires-trustwave-in-810m-security-services-deal/|title=Singtel acquires Trustwave in $810M security services deal|website=ZDNet }} cybersecurity subsidiary of The Chertoff Group. It focuses on providing managed detection and response (MDR), managed security services (MSS), database security, and email security to organizations around the globe.

With customers in 96 countries, it has its international headquarters in downtown Chicago{{cite web|url=https://www.bloomberg.com/research/stocks/private/snapshot.asp?privcapId=11777224|title=Company Overview of TrustWave Holdings, Inc.|date= |accessdate=9 April 2015|publisher=Bloomberg}} and regional offices in London, São Paulo, and Sydney. The company also operates Security Operations Centers in Chicago, Denver, Manila, Minneapolis, Singapore, Sydney, Tokyo, Warsaw, and Waterloo, Ontario.{{cite web|url=http://globalnews.ca/news/2160691/trustwave-security-firm-opens-first-canadian-security-operations-centre-in-kitchener-waterloo/|title=Trustwave security firm opens first Canadian security operations centre in Kitchener-Waterloo|date=12 August 2015|accessdate=30 September 2015|publisher=Global News}}

As of 2015, the company was a standalone business unit{{Cite web|url=https://www.trustwave.com/en-us/company/about-us/our-history/|title=Trustwave: Our History}} cybersecurity independent subsidiary and brand of multinational telecommunications company Singtel.{{cite web|title=TRUSTWAVE PTE. LTD. (200616191R) - Singapore Business Directory|accessdate=30 August 2017|publisher=SGPBusiness.com|url=https://www.sgpbusiness.com/company/Trustwave-Pte-Ltd}} In January 2024, it was announced that The Chertoff Group had completed its acquisition of the firm for $205 million.{{Cite web|url=https://www.darkreading.com/cloud-security/chertoff-group-affiliate-completes-trustwave-acquisition|title=Chertoff Group Affiliate Completes Trustwave Acquisition|work=Dark Reading|access-date=2024-01-26|language=en}}

History

In April 2011, Trustwave Holdings filed for its IPO,{{cite web | url = http://www.securityweek.com/trustwave-files-ipo-reveals-finances| title = Trustwave Files for IPO, Reveals Finances| last = Lennon| first = Mike| date =22 April 2011 | publisher = SecurityWeek| access-date= 8 April 2015}} though it never completed the process. In May 2014, Trustwave withdrew its application,{{cite web | url = https://www.reuters.com/article/idUSL2N0NO1BP| title = Trustwave pulls filing for initial public offering| date =2 May 2014| publisher = Reuters| access-date= 14 April 2024}} citing unfavorable market conditions. Trustwave's website says the company has more than 1,600 employees.{{cite web | url = https://www.trustwave.com/Company/About-Us/Our-Story/| title = Trustwave: Our Story| access-date= 25 May 2016}}

In February 2014, Trustwave SVP Phillip. J. Smith offered expert testimony related to data breaches and malware as part of a Congressional hearing for The House Committee on Energy and Commerce. In his prepared testimony, he presented observations based on the company's experience investigating thousands of data breaches, ongoing malware and security research and other forms of threat intelligence.[https://docs.house.gov/meetings/IF/IF17/20140205/101714/HMTG-113-IF17-20140205-SD009.pdf "Protecting Consumer Information: Can Data Breaches Be Prevented?"] United States House Committee on Energy and Commerce. 5 February 2014. Retrieved 8 April 2015.

On April 8, 2015 (SGT), Singapore Telecommunications Ltd (Singtel) announced it had entered into a definitive agreement to acquire Trustwave Holdings, Inc. for a fee of $810 million—Singtel with a 98% stake in the company leaving 2% with Trustwave's CEO and President.{{cite web | url = https://www.trustwave.com/Company/Newsroom/News/Singtel-to-Acquire-Trustwave-to-Bolster-Global-Cyber-Security-Capabilities/| title = Singtel to Acquire Trustwave to Bolster Global Cyber Security Capabilities| date =7 April 2015 | publisher = Trustwave| access-date= 9 April 2015}} According to media reports and Singtel filings on the Singapore Exchange, the enterprise value of Trustwave at the time of the deal was $850 million.{{cite web | url = https://techcrunch.com/2015/04/07/singtel-trustwave/| title = Singtel Acquires Chicago-based Cybersecurity Firm Trustwave For $810M| last = Shu| first = Catherine| date =7 April 2015 | publisher = TechCrunch| access-date= 13 April 2015}}

In October 2021, Trustwave sold its PCI compliance business to cybersecurity firm Sysnet for $80 million.{{Cite web |last=Novinson |first=Michael |date=2021-10-24 |title=Trustwave Sells PCI Compliance Business To Sysnet For $80M |url=https://www.crn.com/news/security/trustwave-sells-pci-compliance-business-to-sysnet-for-80m |access-date=2022-04-27 |website=CRN}} The sale gave Trustwave the ability to invest more in its core capabilities of managed detection and response (MDR) and managed security services (MSS), according to research firm IDC.{{Cite web |title=IDC Report {{!}} A Strategic Move to Make Trustwave Laser-focused in its Core Offerings |url=https://www.trustwave.com/en-us/resources/library/documents/idc-report-a-strategic-move-to-make-trustwave-laser-focused-in-its-core-offerings/ |access-date=2022-04-27 |website=Trustwave |language=en-US}}

Significant Discoveries

In 2013 and again in 2014 Trustwave SpiderLabs did an analysis of primary Pony botnet controllers. The results of the analysis found that the botnets had gathered more than two million passwords and credentials for accounts on ADP payroll, Facebook, Twitter, Yahoo and more,{{cite web | url = https://www.zdnet.com/article/two-million-stolen-facebook-twitter-yahoo-adp-passwords-found-on-pony-botnet-server/ | title = Two million stolen Facebook, Twitter, Yahoo, ADP passwords found on Pony Botnet server| date = 4 December 2013| publisher = ZDNet| access-date= 21 April 2015}} and over US $220,000 in crypto-currency like Bitcoin.{{cite web | url = https://www.reuters.com/article/us-bitcoin-security-idUSBREA1N1JO20140224 | title = 'Pony' botnet steals bitcoins, digital currencies: Trustwave| date = 24 February 2014| publisher = Reuters| access-date= 21 April 2015}}

In June 2020, Trustwave SpiderLabs discovered a new malware family, which they named GoldenSpy, embedded in tax payment software that a Chinese bank requires corporations to install to conduct business operations in China.{{Cite web |title=The Golden Tax Department and the Emergence of GoldenSpy Malware |url=https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-golden-tax-department-and-the-emergence-of-goldenspy-malware/ |access-date=2022-04-27 |website=Trustwave |date=22 June 2020 |language=en-US}} Trustwave said it was uncertain whether the malware was embedded in all of the tax software or if it was deployed against specific targets. The FBI sent a subsequent warning about this malware threat to companies in healthcare, chemical, and finance industries.{{Cite web |date=2020-07-24 |title=FBI warns US companies about Chinese tax software embedded with hidden malware: Report |url=https://www.foxbusiness.com/technology/fbi-warns-us-companies-about-chinese-tax-software-embedded-with-hidden-malware-report-says |access-date=2022-04-27 |website=FOXBusiness |language=en-US}}

Leading up to the 2020 U.S. presidential election, Trustwave SpiderLabs found a hacker selling info on 186 million U.S. voters during its Dark Web and cybercriminal forum research.{{Cite web |title=Massive US Voters and Consumers Databases Circulate Among Hackers |url=https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/massive-us-voters-and-consumers-databases-circulate-among-hackers/ |access-date=2022-04-27 |website=Trustwave |date=21 October 2020 |language=en-US}} Trustwave turned this information over to the FBI.{{Cite web |title=Cybersecurity company finds hacker selling info on 186 million U.S. voters |url=https://www.nbcnews.com/politics/2020-election/cybersecurity-firm-finds-hacker-selling-info-148-million-u-s-n1244211 |access-date=2022-04-27 |website=NBC News |date=22 October 2020 |language=en}}

In February 2021, Trustwave SpiderLabs discovered two "severe" vulnerabilities in SolarWinds Orion. One of the flaws could’ve allowed a hacker to gain complete remote control of a targeted SolarWinds system. Patches were released January 25 and customers of SolarWinds were urged to patch immediately.{{Cite web |last=Brewster |first=Thomas |title='Severe' SolarWinds Vulnerabilities Allow Hackers To Take Over Servers |url=https://www.forbes.com/sites/thomasbrewster/2021/02/03/severe-solarwinds-vulnerabilities-allow-hackers-to-take-over-servers-update-now/ |access-date=2022-04-27 |website=Forbes |language=en}}

Criticism

Trustwave operates an X.509 certificate authority ("CA") which is used as the top level of trust by many web browsers, operating systems, and other applications (a "trusted root CA").{{citation needed|date=January 2016}} In 2011, Trustwave sold a certificate for a subordinate CA which allowed a customer to present SSL certificates identifying as arbitrary entities, in a similar mechanism to a "Man in the Middle Attack". This type of action is similar to the practice of running an SSL proxy on a corporate network, though in this case a public subordinate CA (valid anywhere) was used instead of an internal corporate-generated domain CA (valid only for machines that accept it as part of organizational policy), making the risk of abuse much higher.

In March 2014, Trustwave was named in a lawsuit filed by Trustmark National Bank and Green Bank N.A. The lawsuit alleges that Trustwave failed to provide the promised level of security to Target, and for failing to meet industry security standards.{{cite web|last=Schwartz|first=Mathew J.|date=26 March 2014|title=Target, PCI Auditor Trustwave Sued By Banks|url=http://www.darkreading.com/risk/compliance/target-pci-auditor-trustwave-sued-by-banks/d/d-id/1127936|accessdate=9 April 2015|publisher=Darkreading}}{{cite web|last=Heun|first=David|date=25 March 2014|title=Banks Sue Security Vendor Trustwave After Target Data Breach|url=http://www.americanbanker.com/issues/179_58/banks-sue-security-vendor-trustwave-after-target-data-breach-1066493-1.html|accessdate=9 April 2015|publisher=American Banker}} In April 2014, a notice of dismissal was filed by both plaintiffs, effectively withdrawing their earlier allegations.{{cite web|last=Kirk|first=Jeremy|date=1 April 2014|title=Banks withdraw data breach claim against Target|url=http://www.computerworld.com/article/2489325/technology-law-regulation/banks-withdraw-data-breach-claim-against-target.html|accessdate=9 April 2015|publisher=Computerworld}}{{cite web|date=29 March 2014|title=Security firm Trustwave says Target data breach claims baseless|url=https://www.reuters.com/article/us-target-trustwave-lawsuit-idUSBREA2T01B20140330|accessdate=9 April 2015|publisher=Reuters}}

References

{{Reflist|30em}}