AT&T / Snowflake Breach - Who's to blame?
Michael Coates
CyberSecurity Venture Capitalist | 3x CISO Twitter, Mozilla, CoinList | Founder(acquired) | Former OWASP Chairman
Call records for 110 million user have been breached from AT&T. AT&T is pointing the finger at Snowflake - who’s at fault? What exactly is going on and how should you protect your organization?
You’ve heard the headlines about the AT&T data breach. Here’s what we know and what this means for you as a Executive responsible for protecting critical data.
First the facts
How did the breach occur?
AT&T has stated that the breach of AT&T data is due to a breach of the vendor data solution, Snowflake.
So it’s Snowflake’s vault? Not so fast, that’s what the sound bite from AT&T may want you to believe, but let’s dive into it.
According to the Mandiant incident analysis of the Snowflake breach,?
“a financially motivated threat actor suspected to have stolen a significant volume of records from Snowflake customer environments. UNC5537 is systematically compromising Snowflake customer instances using stolen customer credentials, advertising victim data for sale on cybercrime forums, and attempting to extort many of the victims.”
The key item here is the use of “stolen customer credentials” meaning the attackers have obtained the target victims username and password and are using this information to just log into snowflake as the victim user. The mandiant report goes on to make this clear and eliminate any confusion that Snowflake themselves have a security vulnerability.
“Mandiant's investigation has not found any evidence to suggest that unauthorized access to Snowflake customer accounts stemmed from a breach of Snowflake's enterprise environment. Instead, every incident Mandiant responded to associated with this campaign was traced back to compromised customer credentials.”
But how is the attacker getting the user login credentials in the first place?
From another Mandiant investigation of a compromised company where Snowflake data was stolen, Mandiant determined the attacker was “using credentials previously stolen via infostealer malware.” So, the attack path to the credentials was good ‘ole fashion malware on the vicitm’s machines (to be clear, not Snowflakes machines, rather the various customers of Snowflake)
“These credentials were primarily obtained from multiple infostealer malware campaigns that infected non-Snowflake owned systems.”
Mandiant worked with Snowflake and notified approximately 165 impacted and potentially exposed organizations where usernames and passwords were at risk.
领英推荐
Pulling this together - who’s to blame?
From what we know so far, malware was used on victim’s computers to steal passwords. These computers were owned and operated by customers of Snowflake, not Snowflake themselves. In addition, Mandiant reached out and notified numerous organizations of the potential exposure and vulnerability. In addition, we’ve already had major news stories about other organizations’ SnowFlake accounts being breached through this exact method.
It seems the blame falls squarely on AT&T and their lack of response to proactively rotate Snowflake credentials.
But wait, there’s more
You may be wondering, how could you log into the main data store of over 110 million customer records with just a username and password? You’re exactly right. Multiple other security controls could have been present to stop this. Here are just a few
As an executive, what should you do now to protect your organization?
Operate under an “assumed breach” scenario for your snowflake credentials and follow the Snowflake incident updates
This means you need to invoke incident response and perform a few crucial activities
Bigger than just Snowflake
As an executive thinking about information systems and security, it’s crucial to have a holistic approach to third party applications. The key tenets of cyber security are important here.
Expert in Privacy-Perserving Machine Learning
8 个月Very insightful breakdown!
Cyber security VC (seed / early stage), entrepreneur, startup advisor.
8 个月Hopefully is the beginning of the end of SMS and the rise of encrypted messengers like Signal.
Cofounder & CEO @ Enzoic Cybersecurity | Block Compromised Credentials
8 个月Good analysis. Snowflake could have also added compromised credential or password screening to user accounts. We looked it up, some of those credentials were in our database for years. ??
Building AI Factories, Open Source & Cloud Native
8 个月Very complete review Michael. IAM/PAM is an evergreen process, on-prem and in the cloud.
Always love your POV!