ADVERTISEMENT
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
lunedì, Aprile 20, 2026
No Result
View All Result
Global News 24
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment
No Result
View All Result
Global News 24
No Result
View All Result
Home Tech

Hackers steal “significant stazza” of patronato from hundreds of Snowflake customers

by admin
11 Giugno 2024
in Tech
0 0
0
AT&T: Data breach affects 73 million or 51 million customers. No, we won’t explain.
0
SHARES
5
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Advertisement. Scroll to continue reading.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Advertisement. Scroll to continue reading.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

ADVERTISEMENT


Hackers steal “significant volume” of data from hundreds of Snowflake customers

Getty Images

As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.

Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.

“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”

Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.

Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.

Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.

Advertisement

The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:

Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.

Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.

The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:

  1. The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
  2. Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
  3. The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.
Attack Path UNC5537 has used in attacks against as many as 165 Snowflake customers.
Enlarge / Attack Path UNC5537 has used durante attacks against as many as 165 Snowflake customers.

Mandiant

Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Tags: customersDataHackersHundredssignificantSnowflakestealvolume
admin

admin

Next Post
Per mezzo di Baltimore, nurses deliver primary care door-to-door : Shots

Per mezzo di Baltimore, nurses deliver primary care door-to-door : Shots

Lascia un commento Annulla risposta

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Popular News

  • PHILIPPINE TRAVEL TAX: How to Pay + How to Apply for Exemption & Refund

    PHILIPPINE TRAVEL TAX: How to Pay + How to Apply for Exemption & Refund

    0 shares
    Share 0 Tweet 0
  • 16 Easy Mediterranean Diet Recipes: Snacks, Salads, Dinners

    0 shares
    Share 0 Tweet 0
  • Running Fumes? Here’s Exactly How To Less Tired

    0 shares
    Share 0 Tweet 0
  • Canary Speech secures $13M for AI-enabled speech recognition software

    0 shares
    Share 0 Tweet 0
  • «European banks are still vulnerable to cyber risk»

    0 shares
    Share 0 Tweet 0
ADVERTISEMENT

About Us

Welcome to Globalnews24.ch The goal of Globalnews24.ch is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Category

  • Business
  • Entertainment
  • Fashion
  • Health
  • Lifestyle
  • Sports
  • Tech
  • Travel
  • World

Recent Posts

  • ‘Complete annihilation of Microsoft, Nvidia … ‘: Iran warns US after Trump threatens to strike bridges, power plants
  • Company Adds 2M Streaming Households, Hits Key Financial Targets
  • Warner Music Group shake-up: Max Lousada to exit; Elliot Grainge named CEO of Atlantic Music Group, with Julie Greenwald as Chairman
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

No Result
View All Result
  • Home
  • World News
  • Business
  • Sports
  • Health
  • Travel
  • Tech
  • Lifestyle
  • Fashion
  • Entertainment

Copyright © 2024 Globalnews24.ch | All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In