Very big cyber incident playing out at Snowflake, who describe themselves as “AI Data Cloud”. They have a free trial where anybody can sign up and upload data… and they have.

Threat actors have been scraping customer data using a tool called rapeflake, for about a month.

The tl;dr of the Snowflake thing is mass scraping has been happening, but nobody noticed.. and they're pointing at customers for having poor credentials. It appears a lot of data has gone walkies from a bunch of orgs.

Snowflake is a big AI data company with a conference in the US next week, chances of that going ahead are interesting.

IOCs: https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake admin users need to check their Snowflake environment, not sec departments check their on prem.

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

❓ 😅
Five orgs have told me they are running incidents for Snowflake, where their data has been copied.

Snowflake: there is absolutely no cybersecurity incident.

Also Snowflake: Please run these commands and look for "threat activity" logins with the user agent "rapeflake" using this knowledge base article we haven't listed on our website.

https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

Live Nation said its stolen database was hosted on Snowflake, a cloud storage and analytics company.

https://techcrunch.com/2024/05/31/live-nation-confirms-ticketmaster-was-hacked-says-personal-information-stolen-in-data-breach/

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach | TechCrunch

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

TechCrunch
I've now confirmed 6 major orgs running Snowflake cyber incidents, so I've made a theme song about Snowflake's response.

The deleted Hudson Rock post on Snowflake breach: https://web.archive.org/web/20240531140540/https://hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection

For the record I don't think all the content is accurate - however Snowflake did have a security incident via their former employee, they have full IR stood up. They didn't follow their own best practices.

I also know multiple orgs who've had their full databases taken from Snowflake.

Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection

Hudson Rock is able to confirm a massive breach at Snowflake was caused by credentials compromised via an Infostealer infection.

I wrote a blog on everything I know about the Snowflake situation https://doublepulsar.com/snowflake-at-central-of-worlds-largest-data-breach-939fc400912e
Snowflake at centre of world’s largest data breach - DoublePulsar

Cloud AI Data platform Snowflake are having a bad month. Due to teenager threat actors and cybersecurity of its own customers… and its own cybersecurity, too, in terms of optics. There are several…

DoublePulsar

The Snowflake authentication setup is terrible.

MFA can’t be enabled org wide, each user has to manually log in and enable it. There’s no policy to block users without MFA. And it uses Duo MFA rather than your orgs MFA. (You can bring your own MFA with SAML).

Also all users log in via a Snowflake domain, so you can just pull creds from info stealer marketplaces or logs.

That’s why they’re being targeted as a platform.

Hudson Rock have put out a statement saying a legal threat from Snowflake caused them to remove their blog. https://www.linkedin.com/posts/hudson-rock_activity-7203433945919578113-RH05 HT @mattburgess
Hudson Rock posted on LinkedIn

Hudson Rock posted images on LinkedIn

What Snowflake isn't saying about its customer data breaches | TechCrunch

As another Snowflake customer confirms a data breach, the cloud data company says its position "remains unchanged."

TechCrunch
One thing I didn't know until recently is Snowflake has a massive fanbase, Apple and Amiga style - if you critique Snowflake in any way people flip tables. The comments on my blog are fun. I mean, the clue is in the product name, really.

IMHO it's fair to call out Snowflake's authentication isn't very good - it's the worst SaaS MFA solution I've seen as it has no top level, easy switch for org wide MFA enforcement.

Combined with putting all customers under *.snowflakecomputing.com sub domain is why their customers are getting owned - infostealers are just full of creds ready to go.

I gather Snowflake are discussing changes to fix, don't tell the fanboys (and yes, they're all dudes).

Mandiant have informed 165 organisations they may have had data exfiltration from their Snowflake hosted databases

https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion/

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion | Google Cloud Blog

A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.

Google Cloud Blog
Pure Storage Documentation portal

Kinda interesting - Mandiant notified Snowflake that over 100 customers had data exfil issues, and Snowflake’s share price immediately began to tank in sells offs - before the incident was made public.
@GossiTheDog SEC be like 👀👀👀
@GossiTheDog some of their telemetry data has and it doesn’t contain customer info…

@GossiTheDog
@Johnhultquist
Even if Snowflake had "proper" MFA authentication across the board, would that have significantly changed the outcome?

That is, if an info stealer is what's at play, and it steals my authentication cookie, I can't really rest at night knowing that MFA is keeping me safe, right?

@wdormann @GossiTheDog @Johnhultquist I think this is why we need device bound credentials, but that spec is still in progress. MFA at least helps with people brute forcing passwords, but rate limiting would help for that too

@jawnsy @wdormann @GossiTheDog @Johnhultquist

How do you device bound credentials? I have only heard of IP bounding them (so if it’s suddenly being used from a different location a new login is required)
And that is already being used by some companies afaik.

@Euph0r14 @wdormann @GossiTheDog @Johnhultquist I don't think you can until this (or something like it) is added to the web standards https://github.com/WICG/dbsc
GitHub - WICG/dbsc

Contribute to WICG/dbsc development by creating an account on GitHub.

GitHub
@GossiTheDog 😱 that seems like a lot

@GossiTheDog

> putting all customers under *.snowflakecomputing.com sub domain

How else would you have them handle it? Nearly all SaaS providers do exactly this.

A popular one you might have come across is *.github.io.

(Not a fanboy; I just work for another SaaS vendor and would like to know if we’re doing anything terribly wrong.)

@GossiTheDog Yeah we were setting up MFA for a Snowflake SSO break-glass account and the enrollment process didn't work ("success" but then locked out), had 2 more people try and it didn't work for them either (same issue), this was months ago so it's probably fixed but I wouldn't be surprised if enrollment friction played a role
@GossiTheDog Couldn't possibly be related... /s
@GossiTheDog maybe it was a bad idea to just dump all the data into one big pile with just a big sign saying “bad guys stay out” defending it.
@GossiTheDog so has their summit actually been going on for the last 3 days? Not sure I'm willing to sign into the hellsite to look for the hashtag.
@GossiTheDog Similar to the old hardware reverse engineering practices where the people touching the original hardware and the engineers designing the clone are never the same people, I wonder if there are quiet companies out there who buy stuff like this and then sell a “customer lead db” to competitor stores in a way where the competitor can legally pretend it isn’t stolen data.
@GossiTheDog @mattburgess That's good considering Hudson Rock's post was completely wrong. Not to mention calling out a specific employee that they believed had been compromised is not only unprofessional, but completely inappropriate. If it had been true, can you imagine the psychological toll of knowing that you were inadvertently responsible for something like that?
@GossiTheDog I don't think that's completely accurate. I login to a couple of Snowflake accounts with my organisational SSO which includes our standard MFA.
@GossiTheDog Our (fairly large) org uses SAML federation, with MFA enforced.
@GossiTheDog I interviewed with them couple months ago, on cloud infra team. Interviewers seemed anxious when I started asking them on security posture practices and procedures. They don’t have any org wide authorization mechanisms and focus only on cost optimization+some automation.
@GossiTheDog re: credential theft, MFA and Recall - what's one of the things that'll be saved? Those handy QR codes for TOTP...

@fencepost @GossiTheDog

Oh fuu....you're right! This just keeps getting worse and worse.

I got to this point in your write-up, and I don't think it can be emphasized enough:

Note that in the age of SaaS, your providers will throw you under the bus to save themselves. When you transfer your security risk to a provider, they don’t accept your risk — they just take the money.[EDIT: typo]

@GossiTheDog

@GossiTheDog Might be a coincidence, but Prolific (paid study/research site) has just temporarily paused pay outs until further notice due to a cryptically worded “possible cyber security incident targeting users”.
@GossiTheDog why was it deleted?
@GossiTheDog some of HR commentary in telegram screengrabs seemed a little strange.. the “should have used HR and they wouldn’t have been breached” bit
@GossiTheDog One thing regarding this, as it might be even more WORSE:
what about datamanipulation? anybody seeing this? as a new threat vector?
@GossiTheDog well done
@jerry @GossiTheDog All in all, that was a hell of a solid thread. Top to bottom.
@GossiTheDog holy crap it's both epic and cringe at the same time.
@GossiTheDog "Oh look, squirrel" literally made me cry
@GossiTheDog These exploit theme songs are so much better than the traditional logos, thank you!
@GossiTheDog I love it, you made my morning with that song
@GossiTheDog Was that made with GenAI? Because this is the first actual creative use of GenAI I've seen in a long time.

Snowflake observed:
+ "malicious traffic"
+ "cyber threat activity targeting some of our customers’ accounts"

Snowflake has not observed
- "a security incident"
- "vulnerability, misconfiguration, or malicious activity within the Snowflake product"

🤔 Threading a mighty fine needle there

@GossiTheDog

To be clear: I'd like to see Snowflake own up to responsibility for creating security capabilities with secure defaults that are hard to misuse in a way that creates severe unintended consequences

Sounds currently like the leaky data lake version of the classic public S3 bucket misconfiguration

I hope they're bringing humility to their customers now, and public acknowledgement later

@GossiTheDog

I'm still trying to parse this statement. A non-exclusive list of meanings is: (a) someone gained access to a trusted part of the Snowflake network and made off with customer credentials or (b) there were credential stuffing attacks that gained access to Snowflake customer accounts.

In either case, the Snowflake statement that management does "not believe this activity is caused by any vulnerability, misconfiguration, or malicious activity within the Snowflake product" would be true.

Does this sound possible to you?

@dangoodin @GossiTheDog Without attempting to interpret the statement to discern any actual facts, I can reconcile this -- in the tradition of Bill Clinton straining the meaning of "is". First, note that "believe" is subjective and people are capable of believing crazy things (a la Upton Sinclair's line about understanding things that threaten one's job). Also, they list and then deny three possible causes -- but there are more problematic possible causes left unmentioned; e.g. weak password isn't quite config, and malicious activity "outside" the product whatever that might mean.
@dangoodin @GossiTheDog I can't this is common, but I have seen Snowflake configured such that you have SAMLfied logins, but then you create exceptions for local auth against snowflake (key auth, pass auth). my guess would be a key walked out the door somewhere.