Very big cyber incident playing out at Snowflake, who describe themselves as “AI Data Cloud”. They have a free trial where anybody can sign up and upload data… and they have.

Threat actors have been scraping customer data using a tool called rapeflake, for about a month.

The tl;dr of the Snowflake thing is mass scraping has been happening, but nobody noticed.. and they're pointing at customers for having poor credentials. It appears a lot of data has gone walkies from a bunch of orgs.

Snowflake is a big AI data company with a conference in the US next week, chances of that going ahead are interesting.

IOCs: https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake admin users need to check their Snowflake environment, not sec departments check their on prem.

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

❓ 😅
Five orgs have told me they are running incidents for Snowflake, where their data has been copied.

Snowflake: there is absolutely no cybersecurity incident.

Also Snowflake: Please run these commands and look for "threat activity" logins with the user agent "rapeflake" using this knowledge base article we haven't listed on our website.

https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

Live Nation said its stolen database was hosted on Snowflake, a cloud storage and analytics company.

https://techcrunch.com/2024/05/31/live-nation-confirms-ticketmaster-was-hacked-says-personal-information-stolen-in-data-breach/

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach | TechCrunch

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

TechCrunch
I've now confirmed 6 major orgs running Snowflake cyber incidents, so I've made a theme song about Snowflake's response.

The deleted Hudson Rock post on Snowflake breach: https://web.archive.org/web/20240531140540/https://hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection

For the record I don't think all the content is accurate - however Snowflake did have a security incident via their former employee, they have full IR stood up. They didn't follow their own best practices.

I also know multiple orgs who've had their full databases taken from Snowflake.

Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection

Hudson Rock is able to confirm a massive breach at Snowflake was caused by credentials compromised via an Infostealer infection.

I wrote a blog on everything I know about the Snowflake situation https://doublepulsar.com/snowflake-at-central-of-worlds-largest-data-breach-939fc400912e
Snowflake at centre of world’s largest data breach - DoublePulsar

Cloud AI Data platform Snowflake are having a bad month. Due to teenager threat actors and cybersecurity of its own customers… and its own cybersecurity, too, in terms of optics. There are several…

DoublePulsar
@GossiTheDog I interviewed with them couple months ago, on cloud infra team. Interviewers seemed anxious when I started asking them on security posture practices and procedures. They don’t have any org wide authorization mechanisms and focus only on cost optimization+some automation.
@caspicat @GossiTheDog exactly, couple slides assuring there’s “encryption at rest/in transit” vs AWS security controls document show the difference and org immaturity - https://docs.aws.amazon.com/pdfs/prescriptive-guidance/latest/aws-security-controls/aws-security-controls.pdf
@patryko @caspicat @GossiTheDog the key isn't to look at what they say, but rather to look at what they don't say.