ShtëpiMalware & KërcënimetBreaches Due to Credential Stuffing: The Responsible Party

Breaches Due to Credential Stuffing: The Responsible Party

Publikuar më

spot_img

The recent data breach of Snowflake’s customers has raised concerns about the need for vendors to enhance their security measures. The attack, which involved credential stuffing, led to the theft of data from multiple accounts belonging to Snowflake’s customers. Organizations such as Santander Bank, Advance Auto Parts, the Los Angeles Unified School District, Neiman Marcus, and Ticketmaster, among others, were affected by the breach.

According to a joint report by Mandiant and CrowdStrike, attackers used a tool called “rapeflake,” now known as “Frostbite,” to automate the credential stuffing process. Approximately 165 organizations were impacted by the breach, with some victims receiving ransom demands for the stolen data. Snowflake’s platform itself was not breached, according to the report, and the attack was attributed to industry-wide identity-based attacks.

The accountability question arises in such incidents, with experts emphasizing the shared responsibility between customers and platforms like Snowflake to combat credential stuffing attacks. Troy Hunt, founder of the Have I Been Pwned breach notification service, highlighted the importance of implementing strong security measures such as strong multifactor authentication (MFA) and blocking reused passwords to prevent such attacks.

In response to the breach, Snowflake has pledged to enhance its MFA and network-based defenses. Currently, the platform supports only one type of MFA, Cisco Duo, managed by Snowflake. The company is considering adding more options for MFA in the future. Additionally, Snowflake supports various SAML-compliant vendors for single sign-on and recommends using key pair authentication or OAuth for machine-to-machine communication.

Mandiant emphasized the need for credential monitoring, universal enforcement of MFA, and secure authentication to prevent similar incidents in the future. Snowflake plans to require customers to implement advanced security controls like multifactor authentication or network policies to enhance security. Vendors and service providers storing customer data should prioritize phishing-resistant MFA and additional security controls to prevent credential stuffing attacks.

Overall, the Snowflake data breach serves as a reminder of the importance of robust cybersecurity measures in protecting customer data. By implementing strong MFA, blocking reused passwords, and monitoring for suspicious behavior, organizations can reduce the risk of credential stuffing attacks and safeguard sensitive information from unauthorized access.

Lidhja e burimit

Artikujt e fundit

10 Billion Leaked Passwords Raise Concerns About Credential Stuffing

Security researchers are currently assessing the aftermath of a significant leak of stolen passwords...

88% increase in smishing attacks leads to improved collaboration between stakeholders in the banking industry.

In a recent report by Banking Frontiers, it has been revealed that there has...

Report: OpenAI Concealed 2023 Breach from Federal Authorities and the Public

A recent report has revealed that a hacker gained unauthorized access to data on...

New Zealand Fitness Retailer Targeted by DragonForce Ransomware

The DragonForce ransomware group, known for using locker malware based on the leaked LockBit...

Më shumë si kjo

10 Billion Leaked Passwords Raise Concerns About Credential Stuffing

Security researchers are currently assessing the aftermath of a significant leak of stolen passwords...

88% increase in smishing attacks leads to improved collaboration between stakeholders in the banking industry.

In a recent report by Banking Frontiers, it has been revealed that there has...

Report: OpenAI Concealed 2023 Breach from Federal Authorities and the Public

A recent report has revealed that a hacker gained unauthorized access to data on...
sqAlbanian