Home Security Ticketmaster’s Snowflake data breach was just one of 165

Ticketmaster’s Snowflake data breach was just one of 165

by Admin
0 comment
A cartoon illustration shows a shadowy figure carrying off a red directory folder, which has a surprised-looking face on its side.

Safety researchers are reporting {that a} “important quantity of knowledge” has been stolen from a whole lot of Snowflake cloud storage clients through compromised login credentials, with the incident being linked to large knowledge breaches at Ticketmaster and Santander Financial institution.

Mandiant, a safety agency investigating the information theft alongside Snowflake, announced on Monday that it had tracked the exercise to a “financially motivated menace actor” it recognized as UNC5537. The 2 corporations have notified at the least 165 Snowflake buyer organizations which will have been compromised because the ongoing menace exercise was found in April, with Mandiant saying its investigation hasn’t discovered “any proof to recommend” that Snowflake’s enterprise setting was breached.

Current knowledge breaches at Ticketmaster, Santander Bank, and LendingTree subsidiary QuoteWizard have been linked to Snowflake cloud storage accounts utilized by the businesses. Official particulars relating to how the accounts have been compromised have been slim till this level, with an earlier third-party report being taken offline after Snowflake issued a statement claiming the platform itself isn’t at fault.

Following its investigation, Mandiant says the but unidentified UNC5537 group is “systematically compromising” Snowflake clients utilizing login credentials stolen through historic infostealer malware infections on non-Snowflake-owned programs. A few of these credentials date again so far as 2020 and enabled UNC5537 to steal knowledge from Snowflake buyer situations in an try and promote it on cybercriminal boards and extort the victims.

See also  PlushDaemon compromises supply chain of Korean VPN service

Mandiant says the UNC5537 marketing campaign has resulted in “quite a few profitable compromises” due to poor safety practices on impacted accounts, which didn’t replace stolen login credentials or make the most of multi-factor authentication (MFA) or community enable lists. The listing of victims, whereas largely unidentified, can also be anticipated to develop, in accordance with Mandiant, having assessed that UNC5337 will doubtless goal extra platforms “within the close to future.”

Source link

You may also like

cbn (2)

Discover the latest in tech and cyber news. Stay informed on cybersecurity threats, innovations, and industry trends with our comprehensive coverage. Dive into the ever-evolving world of technology with us.

© 2024 cyberbeatnews.com – All Rights Reserved.