With data today the new gold, every business in the world is entrusting its crown jewels to cloud storage solutions. We can no longer keep mum about one of the biggest hacks seen in recent times when a sneaky few clever hackers masterminded the biggest breach of data integrity in the history of Snowflake’s cloud services – one of the leading players in the data storage industry. Here is a behind-the-scenes, heart-racing look at how they pulled off the heist.
At the centre of this tale of our digital times is Snowflake, a storage company that provides cloud services to hundreds of companies. Over the course of several days in September, a group of cyberattackers targeted as many as 165 of those customers and successfully accessed their accounts using credentials the adversaries stolen through malware. One victim was Lending Tree’s subsidiary QuoteWizard, which is still working with the police to determine what information attackers might have taken.
The incident is a reminder of just how porous our digital data is and how some seemingly small breaches can have enormous domino effects. Lending Tree’s spokeswoman says she doesn’t believe consumer financial information has been exposed, but the potential of such information being exposed is enough to terrify Lending Tree’s customer base. The lesson here is that good cyber-security is of utmost importance.
Mandient, the GOOGLE-owned security firm hired by Snowflake to determine the full scale of the attack, identified a mercenary group behind it dubbed UNC5537. UNC5537 was using stolen Snowflake customer credentials it primarily gathered from various malware campaigns to break into and steal from Snowflake’s repositories.
The imbroglio was especially despicable given the lack of multifactor authentication among the compromised accounts; as a result, all the bad guys needed to burrow in were a username and password. What makes the breach even more reprehensible is the fact that most of the stolen credentials came from old malware infections as far back as 2020.
Based on its investigations for Snowflake, Mandiant believes that the group maintained access to their spoils through these and related vulnerabilities in the Snowflake security architecture, which included ‘lack of multifactor authentication, credential expiration after extended periods, and lack of network allow lists’, according to the report. This created an ‘ideal environment’ through which the unprecedented effort to exfiltrate data was executed.
With the worst of the fallout behind us, businesses and cybersecurity experts are working through the details of it all, but the prudent steps taken by Snowflake and Mandiant in the immediate aftermath are a poignant reminder of the ongoing cybersecurity cat-and-mouse game out there.
Following a breach, organisations can benefit from re-assessing cybersecurity posture by installing multifactor authentication, rotating credentials regularly, and implementing a network allow list to better combat these insidious threats.
GOOGLE, a company at the forefront of innovative security solutions for the mounting cyber threats of our age, owns Mandiant, making it a potential harbinger of a safer and more secure digital tomorrow. The fact that the Mandiant team analysed this mega-hack so successfully, and soon after the breach happened, underlines the significance of cutting-edge cybersecurity and explains why we must stay vigilant in the face of escalating cyber attacks.
The Snowflake incident is yet another reminder in an ever-eventful digital world of the ingenuity of fraudsters, but also of the resilient spirit of the people who seek to forge ahead despite it all, and better prepare for what lies ahead.
The Snowflake hack indicates that we are now standing at the critical moment in our fightback against cybercrime, that one must remain committed to constant innovation to preserve the sanctity of digital information. Navigating the road ahead in this terrain remains to be seen, but the cyberattack on Snowflake customers should guide us in the fight to retain a digital future in the face of adversaries.
© 2024 UC Technology Inc . All Rights Reserved.