A Large Amount of Data Stolen from Snowflake Environments Uncovered by Mandiant

An estimated 165 organizations operating Snowflake globally might have been impacted by a scheme that exploited stolen credentials to breach customer environments.

Mandiant finds

An estimated 165 organizations operating Snowflake globally might have been impacted by a scheme that exploited stolen credentials to breach customer environments.




Mandiant uncovers a large amount of data stolen from Snowflake environments










In a blog post, Mandiant revealed that the threat actor, referred to as UNC5537, is believed to have acquired a substantial amount of information from Snowflake customer environments.

Responding to the incident, Mandiant stated that UNC5337 likely compiled a list of credentials for Snowflake environments “through various sources of infostealer logs” found online and on the dark web.

Infostealer malware, a type of trojan that collects data from systems, played a key role in the theft. Mandiant mentioned that the stolen Snowflake credentials “were mostly collected from numerous infostealer malware operations that targeted non-Snowflake systems”.

The impacted organizations generally had Snowflake accounts lacking multi-factor authentication (MFA), outdated credentials, and/or overly permissive network settings.

“The affected customer instances didn’t mandate multi-factor authentication and, in several instances, the credentials hadn’t been changed for up to four years,” Mandiant reported.

“Network allow lists were also absent to restrict access to trusted sites.

“The extensive impact of this operation emphasizes the critical need for credential monitoring, the across-the-board enforcement of MFA and secure authentication, restricting traffic to trusted locations for critical data, and alerting about suspicious access attempts.”

Mandiant suggested that the tactics used in this incident could be replicated in similar campaigns targeting other software-as-a-service platforms.

“This operation illustrates the repercussions of a large number of credentials circulating in the infostealer market and may be indicative of threat actors focusing on similar SaaS platforms,” they commented.

“Mandiant predicts that UNC5537 will persist in these intrusions, aiming at additional SaaS platforms in the immediate future.”

CrowdStrike also participated in the response measures.

Snowflake, in a forum statement, announced that they are “collaborating closely with customers as they reinforce their security frameworks to mitigate cyber threats to their operations.”

“We are also devising a strategy to mandate that our customers adopt advanced security measures, such as multi-factor authentication or network policies,” they elaborated.

Snowflake confirmed no signs of any present or previous personnel having their platform credentials compromised.

Mandiant disclosed that UNC5537 operated with financial motives and attempted to extort the affected entities.



About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.