DomZlonamjerni softver i prijetnjeBreaches Due to Credential Stuffing: The Responsible Party

Breaches Due to Credential Stuffing: The Responsible Party

Objavljeno na

spot_img

The recent data breach of Snowflake’s customers has raised concerns about the need for vendors to enhance their security measures. The attack, which involved credential stuffing, led to the theft of data from multiple accounts belonging to Snowflake’s customers. Organizations such as Santander Bank, Advance Auto Parts, the Los Angeles Unified School District, Neiman Marcus, and Ticketmaster, among others, were affected by the breach.

According to a joint report by Mandiant and CrowdStrike, attackers used a tool called “rapeflake,” now known as “Frostbite,” to automate the credential stuffing process. Approximately 165 organizations were impacted by the breach, with some victims receiving ransom demands for the stolen data. Snowflake’s platform itself was not breached, according to the report, and the attack was attributed to industry-wide identity-based attacks.

The accountability question arises in such incidents, with experts emphasizing the shared responsibility between customers and platforms like Snowflake to combat credential stuffing attacks. Troy Hunt, founder of the Have I Been Pwned breach notification service, highlighted the importance of implementing strong security measures such as strong multifactor authentication (MFA) and blocking reused passwords to prevent such attacks.

In response to the breach, Snowflake has pledged to enhance its MFA and network-based defenses. Currently, the platform supports only one type of MFA, Cisco Duo, managed by Snowflake. The company is considering adding more options for MFA in the future. Additionally, Snowflake supports various SAML-compliant vendors for single sign-on and recommends using key pair authentication or OAuth for machine-to-machine communication.

Mandiant emphasized the need for credential monitoring, universal enforcement of MFA, and secure authentication to prevent similar incidents in the future. Snowflake plans to require customers to implement advanced security controls like multifactor authentication or network policies to enhance security. Vendors and service providers storing customer data should prioritize phishing-resistant MFA and additional security controls to prevent credential stuffing attacks.

Overall, the Snowflake data breach serves as a reminder of the importance of robust cybersecurity measures in protecting customer data. By implementing strong MFA, blocking reused passwords, and monitoring for suspicious behavior, organizations can reduce the risk of credential stuffing attacks and safeguard sensitive information from unauthorized access.

Link na izvor

Najnoviji članci

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...

FedRAMP Introduces Fresh Framework for Emerging Technologies

The U.S. federal government has recently introduced a new framework designed to prioritize emerging...

Još ovako

Chinese hackers take advantage of software vulnerability in Cisco systems – Baseline

Chinese hackers have recently been exploiting a software flaw in Cisco products, specifically targeting...

Microsoft discovers critical vulnerabilities in Rockwell PanelView Plus

In a recent development, Microsoft's cybersecurity team has shed light on two significant vulnerabilities...

Gogs Vulnerabilities Allow Attackers to Hack Instances and Steal Source Code

The cybersecurity researchers at SonarSource recently uncovered several vulnerabilities in the popular open-source code...
hrCroatian