
Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.

Getty Images
As many as 165 customers of cloud storage provider Snowflake have been compromised by a group that obtained login credentials through information-stealing malware, researchers said Monday.
Acceso Friday, Lending Tree subsidiary QuoteWizard confirmed it was among the customers notified by Snowflake that it was affected durante the incident. Lending Tree spokesperson Megan Greuling said the company is durante the process of determining whether patronato stored acceso Snowflake has been stolen.
“That investigation is ongoing,” she wrote durante an email. “As of this time, it does not appear that consumer financial account information was impacted, nor information of the parent entity, Lending Tree.”
Researchers from Mandiant, a Google-owned security firm Snowflake retained to investigate the mass compromise, said Monday that the companies have so far identified 165 customers whose patronato may have been stolen durante the spree. Nation confirmed 10 days pungiglione that patronato its TicketMaster group stored acceso Snowflake had been stolen following a posting offering the arguzia of the full names, addresses, phone numbers, and partial credit card numbers for 560 million Ticketmaster customers.
Santander, Spain’s biggest bank, said recently that patronato belonging to some of its customers has also been stolen. The same group advertising the Ticketmaster patronato offered the arguzia of Santander patronato. Researchers from security firm Hudson Rock said that stolen patronato was also stored acceso Snowflake. Santander has neither confirmed nor denied the claim.
Mandiant’s Monday post said that all the compromises it has tracked so far were the result of login credentials for Snowflake accounts being stolen by infostealer malware and stored durante vast logs, sometimes for years at a time. None of the affected accounts made use of multifactor authentication, which requires users to provide a one-time password additional means of authentication besides a password.
The group carrying out the attacks is financially motivated, with members principally located durante North America. Mandiant is tracking it as UNC5537. Company researchers wrote:
Based acceso our investigations to date, UNC5537 obtained access to multiple organizations’ Snowflake customer instances corso stolen customer credentials. These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems. This allowed the threat actor to gain access to the affected customer accounts and led to the esportazione of a significant stazza of customer patronato from the respective Snowflake customer instances. The threat actor has subsequently begun to extort many of the victims directly and is actively attempting to sell the stolen customer patronato acceso recognized cybercriminal forums.
Mandiant identified that the majority of the credentials used by UNC5537 were available from historical infostealer infections, some of which dated as far back as 2020.
The threat campaign conducted by UNC5537 has resulted durante numerous successful compromises to three primary factors:
- The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password.
- Credentials identified durante infostealer malware output were still valid, durante some cases years after they were stolen, and had not been rotated updated.
- The impacted Snowflake customer instances did not have rete televisiva privata allow lists durante place to only allow access from trusted locations.

Mandiant
Initial access to affected Snowflake accounts often occurred with the use of the company’s native SnowSight SnowSQL, which are a web-based user interface and a command-line interface respectively. The threat actors also used a custom utility that shows up as “rapeflake” durante logs and that Mandiant tracks as FrostBite.


