Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeRisk Managements300% Increase in SaaS Breaches as Traditional Defenses Fail to Keep Up

300% Increase in SaaS Breaches as Traditional Defenses Fail to Keep Up

Published on

spot_img

Software as a Service (SaaS) breaches have seen a significant surge, increasing by 300% in the 12 months from September 2023, as reported by Obsidian Security. This rise in breaches is attributed to the failure of traditional security measures to effectively prevent these attacks, leading to cybercriminal groups and nation-state actors targeting SaaS platforms to steal sensitive data.

Organizations are increasingly relying on SaaS applications for critical operations, making them prime targets for cyber attacks. These breaches serve multiple objectives, including financial gain, espionage, and strategic disruption. A recent high-profile incident involved cybercriminals compromising the cloud data warehousing platform Snowflake, resulting in over 160 companies with Snowflake deployments being warned of potential impacts, including major telecoms company AT&T. The cybercriminals were able to extort approximately $2.5 million as part of their campaign.

According to Obsidian Security, the healthcare sector experienced the highest number of SaaS breaches from September 2023-2024, accounting for 14% of the total breaches. This was followed by state and local government (13%) and financial services (11%).

The report highlighted that traditional security measures are failing to prevent SaaS attacks, even against organizations with robust security measures in place. The shift towards using SaaS applications for data storage means that protecting SaaS accounts is crucial to safeguarding sensitive information. The integrated nature of SaaS platforms allows threat actors to easily move laterally across multiple applications with just a single compromised identity.

In the case of the Snowflake incident, the lack of multi-factor authentication (MFA) enabled the attackers to gain access with just a valid username and password, which had been obtained from a previous infostealer campaign. Obsidian Security’s research found that most SaaS breaches (85%) originated from a compromised identity.

Various credential compromise techniques were used to target SaaS applications, including Adversary-in-the-middle (AiTM) attacks, self-service password reset, single-factor password guessing, and push fatigue. Despite the use of MFA in many instances, 84% of the analyzed incidents showed that MFA failed to prevent the attackers from gaining access, due to weak implementation and bypass techniques like AiTM.

The researchers emphasized the need for organizations to gain a comprehensive view of all SaaS applications and services in use, implement least privilege access controls, and establish ongoing monitoring for SaaS environments to mitigate these attacks effectively. As the targeting of SaaS platforms is expected to increase in 2025, proactive measures to secure these platforms are crucial in protecting sensitive data from cyber threats.

Source link

Latest articles

Over $1M stolen for Bar Harbor school construction project

BAR HARBOR, Maine - Following a devastating cyber crime, the Mount Desert Island Regional...

Microsoft Discovers Fresh XCSSET MacOS Malware Version Aiming at Xcode Projects

A new variant of the XCSSET macOS malware has been discovered by Microsoft Threat...

Microsoft Rewards Hackers with $16.6 Million Despite Ongoing Windows Zero Days

Microsoft's bug bounty program has been in operation since 2013, aiming to secure products...

Guardians of AIoT: Defending Smart Devices Against Data Poisoning

The threat of data poisoning in artificial intelligence of things (AIoT) systems continues to...

More like this

Over $1M stolen for Bar Harbor school construction project

BAR HARBOR, Maine - Following a devastating cyber crime, the Mount Desert Island Regional...

Microsoft Discovers Fresh XCSSET MacOS Malware Version Aiming at Xcode Projects

A new variant of the XCSSET macOS malware has been discovered by Microsoft Threat...

Microsoft Rewards Hackers with $16.6 Million Despite Ongoing Windows Zero Days

Microsoft's bug bounty program has been in operation since 2013, aiming to secure products...