Very big cyber incident playing out at Snowflake, who describe themselves as “AI Data Cloud”. They have a free trial where anybody can sign up and upload data… and they have.

Threat actors have been scraping customer data using a tool called rapeflake, for about a month.

The tl;dr of the Snowflake thing is mass scraping has been happening, but nobody noticed.. and they're pointing at customers for having poor credentials. It appears a lot of data has gone walkies from a bunch of orgs.

Snowflake is a big AI data company with a conference in the US next week, chances of that going ahead are interesting.

IOCs: https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake admin users need to check their Snowflake environment, not sec departments check their on prem.

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

❓ 😅
Five orgs have told me they are running incidents for Snowflake, where their data has been copied.

Snowflake: there is absolutely no cybersecurity incident.

Also Snowflake: Please run these commands and look for "threat activity" logins with the user agent "rapeflake" using this knowledge base article we haven't listed on our website.

https://community.snowflake.com/s/article/Communication-ID-0108977-Additional-Information

Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

Live Nation said its stolen database was hosted on Snowflake, a cloud storage and analytics company.

https://techcrunch.com/2024/05/31/live-nation-confirms-ticketmaster-was-hacked-says-personal-information-stolen-in-data-breach/

Live Nation confirms Ticketmaster was hacked, says personal information stolen in data breach | TechCrunch

Live Nation says its Ticketmaster subsidiary was hacked. A hacker claims to be selling 560 million customer records.

TechCrunch
I've now confirmed 6 major orgs running Snowflake cyber incidents, so I've made a theme song about Snowflake's response.

The deleted Hudson Rock post on Snowflake breach: https://web.archive.org/web/20240531140540/https://hudsonrock.com/blog/snowflake-massive-breach-access-through-infostealer-infection

For the record I don't think all the content is accurate - however Snowflake did have a security incident via their former employee, they have full IR stood up. They didn't follow their own best practices.

I also know multiple orgs who've had their full databases taken from Snowflake.

Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection

Hudson Rock is able to confirm a massive breach at Snowflake was caused by credentials compromised via an Infostealer infection.

I wrote a blog on everything I know about the Snowflake situation https://doublepulsar.com/snowflake-at-central-of-worlds-largest-data-breach-939fc400912e
Snowflake at centre of world’s largest data breach - DoublePulsar

Cloud AI Data platform Snowflake are having a bad month. Due to teenager threat actors and cybersecurity of its own customers… and its own cybersecurity, too, in terms of optics. There are several…

DoublePulsar

The Snowflake authentication setup is terrible.

MFA can’t be enabled org wide, each user has to manually log in and enable it. There’s no policy to block users without MFA. And it uses Duo MFA rather than your orgs MFA. (You can bring your own MFA with SAML).

Also all users log in via a Snowflake domain, so you can just pull creds from info stealer marketplaces or logs.

That’s why they’re being targeted as a platform.

Hudson Rock have put out a statement saying a legal threat from Snowflake caused them to remove their blog. https://www.linkedin.com/posts/hudson-rock_activity-7203433945919578113-RH05 HT @mattburgess
Hudson Rock posted on LinkedIn

Hudson Rock posted images on LinkedIn

What Snowflake isn't saying about its customer data breaches | TechCrunch

As another Snowflake customer confirms a data breach, the cloud data company says its position "remains unchanged."

TechCrunch
One thing I didn't know until recently is Snowflake has a massive fanbase, Apple and Amiga style - if you critique Snowflake in any way people flip tables. The comments on my blog are fun. I mean, the clue is in the product name, really.

IMHO it's fair to call out Snowflake's authentication isn't very good - it's the worst SaaS MFA solution I've seen as it has no top level, easy switch for org wide MFA enforcement.

Combined with putting all customers under *.snowflakecomputing.com sub domain is why their customers are getting owned - infostealers are just full of creds ready to go.

I gather Snowflake are discussing changes to fix, don't tell the fanboys (and yes, they're all dudes).

Mandiant have informed 165 organisations they may have had data exfiltration from their Snowflake hosted databases

https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion/

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion | Google Cloud Blog

A campaign targeting Snowflake customer database instances with the intent of data theft and extortion.

Google Cloud Blog
Pure Storage Documentation portal

Kinda interesting - Mandiant notified Snowflake that over 100 customers had data exfil issues, and Snowflake’s share price immediately began to tank in sells offs - before the incident was made public.

✅ won a game of Call of Duty
✅ hacked the world’s largest companies
✅ used an infostealer

Can’t wait for these guys to have super secure Microsoft Recall, which is definitely encrypted from the user 🤪🤪🫡

https://www.bleepingcomputer.com/news/security/pure-storage-confirms-data-breach-after-snowflake-account-hack/

Pure Storage confirms data breach after Snowflake account hack

Pure Storage, a leading provider of cloud storage systems and services, confirmed on Monday that attackers breached its Snowflake workspace and gained access to what the company describes as telemetry information

BleepingComputer

Snowflake have told customers "We are also developing a plan to require our customers to implement advanced security controls, like multi-factor authentication (MFA) or network policies, especially for privileged Snowflake customer accounts."

Good! They also say the attack was "not caused by a vulnerability, misconfiguration, or breach of its product". Just happy little bad MFA.

Nice: "In a phone call this week, Jones (Snowflake CISO) told WIRED that Snowflake is working on giving its customers the ability to mandate that users of their accounts employ multifactor authentication going forward, “and then we’ll be looking in the future to [make the] default MFA,” he says."

This will be a great outcome for Snowflake customers and Snowflake itself. I know Snowflake got big mad at me for pointing it out, but that was a prime weakness in their MFA.

https://www.wired.com/story/epam-snowflake-ticketmaster-breach-shinyhunters/

Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

A ShinyHunters hacker tells WIRED that they gained access to Ticketmaster’s Snowflake cloud account—and others—by first breaching a third-party contractor.

WIRED
Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection

Hudson Rock is able to confirm a massive breach at Snowflake was caused by credentials compromised via an Infostealer infection.

65 page PDF on searching for Snowflake malicious activity: https://services.google.com/fh/files/misc/snowflake-threat-hunting-guide.pdf
When Snowflake allows orgs to easily mandate MFA across their users, I plan to answer this forum post from 2019. https://community.snowflake.com/s/question/0D50Z00008ugjwISAQ/is-there-a-way-to-force-all-users-to-use-mfa
Snowflake Community

Join our community of data professionals to learn, connect, share and innovate together

Cisco has a look across the wider infostealer problem, using Snowflake as a jumping off point: https://blog.talosintelligence.com/infostealer-landscape-facilitates-breaches/
Snowflake isn’t an outlier, it’s the canary in the coal mine

By Nick Biasini with contributions from Kendall McKay and Guilherme Venere Headlines continue to roll in about the many implications and follow-on attacks originating from leaked and/or stolen credentials for the Snowflake cloud data platform. Adversaries obtained stolen login credentials for Snowflake accounts acquired via information-stealing malware and used

Cisco Talos Blog

I think SaaS providers who provide their own authentication have a responsibility to provide robust, *enforceable* MFA for their customers - so if an org wants all their users to require MFA, they can and it’s just an easy tick box.

Some SaaS providers aren’t doing this - - and it’s the reason infostealer logs are such a problem. Their angle is customer is solely responsible, but as a counterpoint: see how that is working out for Snowflake.

Snowflake have rolled out MFA changes:

- A new authentication policy that requires MFA for all users in a Snowflake account

- prompting for user-level MFA setup

- Snowflake Trust Center for monitoring adherence to MFA policies

This solves all the inherent product weaknesses from the prior setup, they did a good job.

https://www.snowflake.com/blog/snowflake-admins-enforce-mandatory-mfa/

AT&T become latest org caught up in Snowflake incident - they’ve had phone call records and text messages stolen for nearly all customers. https://www.404media.co/hackers-steal-text-and-call-records-of-nearly-all-at-t-customers/
Hackers Steal Text and Call Records of ‘Nearly All’ AT&T Customers

In one of the most significant data breaches in recent history, hackers stole AT&T customers’ call and text metadata spanning several months.

404 Media

The person who got arrested for this is likely a kid btw, there’s a bunch on Telegram who operate with terrible OPSEC.

Turns out yeeting your most sensitive data into a “AI Data Cloud” with no enforceable (at the time) MFA was a bad idea.

An observation - AT&T, which today announced the biggest data breach of any telco worldwide ever - is down 0.35% on stock market

Snowflake, who own the SaaS platform, are down another 2%, 15% down over 3 months

Each breach has driven Snowflake’s share price down, but not their customer’s share price

In other words: 2024 reality, if you’re a SaaS provider, infostealers and cyber crime groups are a competitor - you have to be shit hot at authentication (even if it inconveniences the customer)

Advanced Auto Parts have confirmed 2.3 million people impacted in their Snowflake breach. https://www.helpnetsecurity.com/2024/07/12/breach-snowflake-mfa/
Info of 2,3+ million individuals stolen in Advance Auto Parts data breach - Help Net Security

Advance Auto Parts confirms personal info of 2,3+ million people were stolen in the data breach involving Snowflake accounts without MFA.

Help Net Security

The AT&T Snowflake database wasn’t a law enforcement database, that is false.

They’re a major Snowflake customer, they put CDR in to do data analysis.

They subscribe to Snowflake Telecom Data Cloud and push petabytes of data in, as do other telcos. Snowflake had no way to mandate MFA on local accounts (that is fixed now).

The latest Snowflake quarterly results dropped on Wednesday so I looked at their investor presentation, to see what they said about the security incident.

Nothing.

The company's net loss widened to $317 million, from $227 million during the same period a year earlier but this isn’t unusual, they have had accelerated losses for some time.

More smart changes by Snowflake

MFA enforced on all accounts and all new sign ups

Long term plan to go passwordless for authentication (or rather no single factor password auth)

https://www.snowflake.com/en/blog/multi-factor-identification-default/

Snowflake Strengthens Security with Default Multi-Factor Authentication and Stronger Password Policies

MFA will be enforced for all human users in any Snowflake account created in October 2024. Learn how to prepare for the upcoming changes.

Paywall'd article, but a fun look at infostealers and how they played a part in the Snowflake happy little cyber incident earlier this year https://www.404media.co/inside-the-massive-crime-industry-that-is-hacking-billion-dollar-companies-copy-2/
Inside the Massive Crime Industry That is Hacking Billion Dollar Companies

When you download that piece of pirated software, you might be also getting a piece of infostealer malware, and entering a highly complex hacking ecosystem that is fueling some of the biggest breaches on the planet.

404 Media
@GossiTheDog this passwordless thing is the email with the magic link, like StreamYard?
@GossiTheDog well, yeah, that’s because board rooms absolutely do not give a shit about cyber security unless they are a cyber security company (and even then it’s marginal interest at best)
@GossiTheDog I got a LinkedIn invite from Snowflake just 2 days ago to a webinar they were running on cybersecurity. I'll give them credit, they've got chutzpah.
@GossiTheDog In the earnings call, Ramaswamy mentioned it during the opening, if only to reiterate that it wasn't an internal breach. He also implored customers to enable MFA
@GossiTheDog Snowflake might be the easiest way to analyze CDRs in anything like a reasonable period of time. They're horrendously chatty.
@GossiTheDog being slow / misunderstanding. Re your last point, how are they a competitor? Do you mean that they enable your competitors as by compromising your SaaS they make your customers move to a competitor?
@tobes2 @GossiTheDog one interpretation of “competitor” could be: “when competitor does well, our share price drops”
@GossiTheDog the other lesson here seems to be that if you're some asshole company like AT&T, you can mitigate risk to your shareholders by blaming it all on your vendors and having them take the share value hit for you.
@GossiTheDog I'm hoping aussie government gets their shit together after some high profile attacks recently. Optus. Medibank.
It really seems these companies don't give a shit till they get fucked.

@GossiTheDog @SwiftOnSecurity

Maybe taking the blame for breaches *is* their value proposition.

@GossiTheDog @SwiftOnSecurity

Are these supposed to be meaningful declines in value?

They’ll just move on

Only ransomware has ever made companies care about security.

@GossiTheDog
So from the market's perspective, they've successfully implemented breach-reputation-laundering-as-a-service? Dynamic-scapegoat-provisioning? (I'm not sure how you'd even do that *intentionally* :)
@GossiTheDog But it had encryption! All our data was encrypted, how could this have happened?
@GossiTheDog It’s still completely wild to me that an org as big as that isn’t just using SSO with SAML/OIDC.
@GossiTheDog
Oh, they v& somebody for this already?
@GossiTheDog (adds a nick to an already full scoreboard titled "proof that keeping customers' records is a bad idea")
@GossiTheDog It’s a good start! #AWS doesn’t even let admins force #IAM users to use #MFA !
@GossiTheDog all it took was a massive data breach that affected millions of people
@GossiTheDog I don't get how this isn't default for cloud services. Better late than never I guess.
@GossiTheDog The word Snowflake just gives me the mental image of someone taking this post out of context and turning it into a conspiracy theory surrounding either multi-factor authentication or, alternatively, grad school writing workshops.

@GossiTheDog if the SaaS vendors could provide SSO integration without having to pay extra, it will definitely help reduce these type of events. Stop putting paywalls on basic security features. Not all companies can afford to pay for enterprise licences to get SSO.

https://sso.tax/

The SSO Wall of Shame

A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.

The SSO Wall of Shame
@GossiTheDog "I would also like to have a setting that enforces MFA. Hopefully this can be implemented soon," said Bas... *two years ago*.

@zackwhittaker @GossiTheDog Exactly.

Blaming the users on their password hygiene, when you don't offer org admins any way to enforce SSO or MFA, is a bit ... let's say, not a great look

@GossiTheDog out of the memory hole it returns, lol
@GossiTheDog Do we know why it got removed? Did Snowflake C&D them? And if so, why, is there anything manifestly untrue in it? (Looked to me from the archive that HR was careful to state that this was all 'claimed by the hacker', not proven facts).
@GossiTheDog into the memory hole it goes

@GossiTheDog seems like misconfiguration if it can be fixed by forcing customers into using a different configuration…

but I guess it wasn’t a misconfiguration of snowflake’s own production account(s) at least

@GossiTheDog Oh my "It's a happy little cyber incident!" is now stuck in my head.

@GossiTheDog people who still use #Windows11 should be legally barred from doing anything re: #ITsec.

  • except when they only use it as target for hacking and research and not their professional machine where they handle actual data on!
@GossiTheDog SEC be like 👀👀👀
@GossiTheDog some of their telemetry data has and it doesn’t contain customer info…

@GossiTheDog
@Johnhultquist
Even if Snowflake had "proper" MFA authentication across the board, would that have significantly changed the outcome?

That is, if an info stealer is what's at play, and it steals my authentication cookie, I can't really rest at night knowing that MFA is keeping me safe, right?

@wdormann @GossiTheDog @Johnhultquist I think this is why we need device bound credentials, but that spec is still in progress. MFA at least helps with people brute forcing passwords, but rate limiting would help for that too

@jawnsy @wdormann @GossiTheDog @Johnhultquist

How do you device bound credentials? I have only heard of IP bounding them (so if it’s suddenly being used from a different location a new login is required)
And that is already being used by some companies afaik.

@Euph0r14 @wdormann @GossiTheDog @Johnhultquist I don't think you can until this (or something like it) is added to the web standards https://github.com/WICG/dbsc
GitHub - WICG/dbsc

Contribute to WICG/dbsc development by creating an account on GitHub.

GitHub
@GossiTheDog 😱 that seems like a lot