- cross-posted to:
- [email protected]
- [email protected]
- cross-posted to:
- [email protected]
- [email protected]
Access was gained through a third-party cloud database provider, which we know to be Snowflake.
They should be charged an “inconvenience fee” for each and every person whose data was breached.
To put it bluntly, a single credential resulted in the exfiltration of potentially hundreds of companies that stored their data using Snowflake, with the threat actor himself suggesting 400 companies are impacted. The goal of the threat actor, as in most cases, was to blackmail Snowflake into buying their own data back for $20,000,000.
Santander, a major financial organization, had been breached, and all customer data was offered for sale: the price was $2 million.
Uh huh. A bank. So probably a lot of companies with important stuff.
goes to Snowflake website
Ah, they have a “customer” section that lists some customers with 202 entries.
Albertsons looks like the first.
https://www.snowflake.com/en/customers/all-customers/
Pfizer. Sainsbury’s. PlayStation. AT&T. Euintelsat OneWeb (that’s the sorta-kinda Starlink competitor). NHS Greater Manchester Integrated Care Partnership. Freddie Mac (large US government-backed mortgage lender). Capital One, a bank. Anthem, a major health insurer. A bunch of California government institutions. NatWest, a bank. Western Union. Vimeo. Siemens. Comcast. Cedar Health, a company that provides healthcare billing services. Aflac, an insurance company.
Yup, sounds like this isn’t good.
Well, I’ve said before that it’d probably take some kind of really catastrophic computer security event for things to change.
The cyber insurance market has already hardened a lot over the last few years. It was just starting to ease up but I’m guessing this will cause even stricter underwriting requirements.
my work has been migrating to snowflake for the past year, great…
As usually, I’ve read out this here in the last couple of days and still no email communication from Ticketmaster.
I’ve been wondering about this a little, if the exposure is greater than just increased spam and phishing risk (due to PII info being breached).
If they’ve got hashed credit card details and the last 4 digits, could they fire guesses at the hashes (just like l0phtcrack for CCs instead of windows SAM databases)?
How much risk is there to people’s personal funds via their credit cards?