{"id":11469,"date":"2024-06-18T00:12:34","date_gmt":"2024-06-18T00:12:34","guid":{"rendered":"https:\/\/thisbiginfluence.com\/?p=11469"},"modified":"2024-06-18T00:12:34","modified_gmt":"2024-06-18T00:12:34","slug":"hackers-detail-how-they-allegedly-stole-ticketmaster-data-from-snowflake","status":"publish","type":"post","link":"https:\/\/thisbiginfluence.com\/?p=11469","title":{"rendered":"Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p class=\"paywall\">It\u2019s potential the ShinyHunter hackers didn&#8217;t straight hack the EPAM employee, and easily gained entry to the Snowflake accounts utilizing usernames and passwords they obtained from previous repositories of credentials stolen by information stealers. However, as Reddington factors out, which means anybody else can sift by means of these repositories for these and different credentials stolen from EPAM accounts. Reddington says they discovered knowledge on-line that was utilized by 9 completely different infostealers to reap knowledge from the machines of EPAM staff. This raises potential considerations concerning the safety of information belonging to different EPAM clients.<\/p>\n<p class=\"paywall\">EPAM has clients throughout numerous crucial industries, together with banks and different monetary companies, well being care, broadcast networks, pharmaceutical, power and different utilities, insurance coverage, and software program and hi-tech\u2014the latter clients embody Microsoft, Google, Adobe, and Amazon Net Providers. It\u2019s not clear, nevertheless, if any of those firms have Snowflake accounts to which EPAM staff have entry. WIRED additionally wasn\u2019t in a position to affirm whether or not Ticketmaster, Santander, Lending Tree, or Advance AutoParts are EPAM clients.<\/p>\n<p class=\"paywall\">The Snowflake marketing campaign additionally highlights the rising safety dangers from third-party firms generally and from infostealers. In its weblog submit this week, Mandiant prompt that a number of contractors had been breached to realize entry to Snowflake accounts, noting that contractors\u2014typically referred to as enterprise course of outsourcing (BPO) firms\u2014are a possible gold mine for hackers, as a result of compromising the machine of a contractor that has entry to the accounts of a number of clients may give them direct entry to many buyer accounts.<\/p>\n<p class=\"paywall\">\u201cContractors that clients have interaction to help with their use of Snowflake might make the most of private and\/or non-monitored laptops that exacerbate this preliminary entry vector,\u201d wrote Mandiant in its weblog submit. \u201cThese gadgets, typically used to entry the techniques of a number of organizations, current a big threat. If compromised by infostealer malware, a single contractor&#8217;s laptop computer can facilitate risk actor entry throughout a number of organizations, typically with IT and administrator-level privileges.\u201d<\/p>\n<p class=\"paywall\">The corporate additionally highlighted the rising threat from infostealers, noting that almost all of the credentials the hackers used within the Snowflake marketing campaign got here from repositories of information beforehand stolen by numerous infostealer campaigns, a few of which dated way back to 2020. \u201cMandiant recognized a whole lot of buyer Snowflake credentials uncovered by way of infostealers since 2020,\u201d the corporate famous.<\/p>\n<p class=\"paywall\">This, accompanied by the truth that the focused Snowflake accounts didn\u2019t use MFA to additional shield them, made the breaches on this marketing campaign potential, Mandiant notes.<\/p>\n<p class=\"paywall\">Snowflake\u2019s CISO, Brad Jones, <a href=\"https:\/\/medium.com\/snowflake\/detecting-and-preventing-unauthorized-user-access-d67be8bd66f6\">acknowledged last week<\/a> that the dearth of multifactor authentication enabled the breaches. In a cellphone name this week, Jones advised WIRED that Snowflake is engaged on giving its clients the flexibility to mandate that customers of their accounts make use of multifactor authentication going ahead, \u201cafter which we\u2019ll be trying sooner or later to [make the] default MFA,\u201d he says.<\/p>\n<p class=\"paywall\"><em>Replace 6\/17\/2024, 5:45 pm EDT: The article was up to date to make clear the main points that Santander has publicly revealed concerning the hack.<\/em><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.wired.com\/story\/epam-snowflake-ticketmaster-breach-shinyhunters\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s potential the ShinyHunter hackers didn&#8217;t straight hack the EPAM employee, and easily gained entry to the Snowflake accounts utilizing usernames and passwords they obtained from previous repositories of credentials stolen by information stealers. However, as Reddington factors out, which means anybody else can sift by means of these repositories for these and different credentials [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":11471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[7939,2282,9413,5048,9415,3456,9414],"class_list":["post-11469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-allegedly","tag-data","tag-detail","tag-hackers","tag-snowflake","tag-stole","tag-ticketmaster"],"_links":{"self":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/11469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11469"}],"version-history":[{"count":0,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/posts\/11469\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=\/wp\/v2\/media\/11471"}],"wp:attachment":[{"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thisbiginfluence.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}