UNC5537, a notorious cybercriminal group, has been causing havoc in the digital world recently. The group, suspected to have links to ShinyHunters or Scattered Spider, has been behind the theft of over 560 million customer records from Ticketmaster, which were subsequently put up for sale on the reconstituted leak site, BreachForums, on May 28. The cybercriminals demanded a hefty sum of $500,000 for the stolen data. Just two days later, UNC5537 claimed to have stolen 30 million account records from Santander Bank, a Spain-based financial institution, and asked for a staggering $2 million in ransom. Both Ticketmaster and Santander Bank acknowledged the breaches following the cybercriminals’ postings.
The root cause behind these data leaks, as well as at least 163 other breaches, was not attributed to vulnerabilities in the systems but rather to the use of stolen credentials and lax controls on multifactor authentication (MFA). A detailed analysis conducted on June 10 by Mandiant, a subsidiary of Google specializing in incident response, revealed that compromised customer credentials were responsible for unauthorized access to Snowflake customer accounts, rather than any breach of Snowflake’s enterprise environment.
To prevent such incidents in the future, companies are advised to prioritize the adoption of robust security measures such as MFA. While a significant percentage of workers and administrators use MFA, there remains a substantial number of organizations with root users or administrators lacking MFA on their accounts. Ensuring 100% enforcement of MFA and implementing additional security measures like device-based authentication are crucial steps in safeguarding sensitive infrastructure.
Furthermore, organizations are urged to implement access control lists (ACLs) to restrict user access to cloud services and conduct regular reviews of access logs to detect any suspicious activity. By limiting authorized IP addresses, companies can mitigate the risk of cyberattacks and enhance their security posture.
Visibility into cloud services is also paramount in detecting and preventing attacks, as highlighted by experts in the field. Continuous monitoring of applications, log data, and access activity can help organizations identify potential threats and take proactive measures to safeguard their data. Alerting on specific behavior or threat detections is essential to counteract cybercriminals’ attempts at unauthorized access to cloud data.
Additionally, companies should not solely rely on their cloud providers’ defaults for security. While cloud service providers emphasize shared responsibility for security, organizations must take proactive measures to enhance their security posture. It is imperative to verify that third-party service providers handling sensitive data are compliant with security best practices to avoid potential data breaches.
In conclusion, the recent wave of cloud breaches serves as a wake-up call for organizations to prioritize cybersecurity measures and remain vigilant against evolving cyber threats. By implementing robust security controls, enforcing MFA, and proactively monitoring cloud services, companies can better protect their sensitive data and mitigate the risk of data breaches orchestrated by cybercriminal groups like UNC5537.
