SoatDev IT Consulting
SoatDev IT Consulting
  • About us
  • Expertise
  • Services
  • How it works
  • Contact Us
  • News
  • June 11, 2024
  • Rss Fetcher
A cartoon illustration shows a shadowy figure carrying off a red directory folder, which has a surprised-looking face on its side.
Illustration: Beatrice Sala

Security researchers are reporting that a “significant volume of data” has been stolen from hundreds of Snowflake cloud storage customers via compromised login credentials, with the incident being linked to massive data breaches at Ticketmaster and Santander Bank.

Mandiant, a security firm investigating the data theft alongside Snowflake, announced on Monday that it had tracked the activity to a “financially motivated threat actor” it identified as UNC5537. The two companies have notified at least 165 Snowflake customer organizations that may have been compromised since the ongoing threat activity was discovered in April, with Mandiant saying its investigation hasn’t found “any evidence to suggest” that Snowflake’s enterprise environment was breached.

Recent data breaches at Ticketmaster, Santander Bank, and LendingTree subsidiary QuoteWizard have been linked to Snowflake cloud storage accounts used by the companies. Official details regarding how the accounts were compromised have been slim until this point, with an earlier third-party report being taken offline after Snowflake issued a statement claiming the platform itself isn’t at fault.

Following its investigation, Mandiant says the yet unidentified UNC5537 group is “systematically compromising” Snowflake customers using login credentials stolen via historical infostealer malware infections on non-Snowflake-owned systems. Some of these credentials date back as far as 2020 and enabled UNC5537 to steal data from Snowflake customer instances in an attempt to sell it on cybercriminal forums and extort the victims.

Mandiant says the UNC5537 campaign has resulted in “numerous successful compromises” because of poor security practices on impacted accounts, which did not update stolen login credentials or utilize multi-factor authentication (MFA) or network allow lists. The list of victims, while largely unidentified, is also expected to grow, according to Mandiant, having assessed that UNC5337 will likely target additional platforms “in the near future.”

Previous Post
Next Post

Recent Posts

  • In just 3 months, CoreWeave CEO, once a crypto-mining bro, becomes a deca-billionaire
  • Threads now lets you manage Hidden Words separately from Instagram, set time limits
  • Google Photos merges classic search with AI to speed up results
  • Uber has Atlanta’s autonomous ride-hailing and delivery market on lock
  • Rivian cuts dozens on manufacturing team ahead of R2 launch

Categories

  • Industry News
  • Programming
  • RSS Fetched Articles
  • Uncategorized

Archives

  • June 2025
  • May 2025
  • April 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023

Tap into the power of Microservices, MVC Architecture, Cloud, Containers, UML, and Scrum methodologies to bolster your project planning, execution, and application development processes.

Solutions

  • IT Consultation
  • Agile Transformation
  • Software Development
  • DevOps & CI/CD

Regions Covered

  • Montreal
  • New York
  • Paris
  • Mauritius
  • Abidjan
  • Dakar

Subscribe to Newsletter

Join our monthly newsletter subscribers to get the latest news and insights.

© Copyright 2023. All Rights Reserved by Soatdev IT Consulting Inc.