Security Best Practices in the Aftermath of the Snowflake Data Breach
Data warehousing giant Snowflake disclosed on May 23, 2024, that they experienced a data breach affecting at least 165 of its customers. Since Snowflake’s customers are industry giants such as LiveNation and Santander Bank, this incident is already shaping up to be one of the most significant data breaches in history.
Snowflake has not yet disclosed precisely how this incident occurred. However, statements by Snowflake and forensic investigators on its behalf indicate that this breach was the result of credential theft.
Snowflake has publicly stated that “the threat actor obtained personal credentials to and accessed a demo account owned by a former Snowflake employee,” and Mandiant (which was hired by Snowflake to help with the forensic investigation of the attack), has stated that “Mandiant’s investigation has not found any evidence to suggest that unauthorized access to Snowflake customer accounts stemmed from a breach of Snowflake’s enterprise environment. Instead, every incident Mandiant responded to associated with this campaign was traced back to compromised customer credentials.”
User credentials can be stolen in various ways, some of which are within the organization’s control and others not. Nonetheless, it is helpful to look at the most common ways in which attackers steal credentials and how to reduce the risk of them occurring.
How Attackers Steal Credentials
Passwords are encrypted in hashes, and when a data breach occurs that contains passwords, those are typically stored in hashes, not plain text. However, the constant advancement in computing power makes it increasingly easy for attackers to decrypt hashes in plaintext format. Although even a moderately strong password will generate a hash too complex to decrypt in a reasonable time, weaker passwords are vulnerable to such tactics. And when those passwords are being re-used across multiple accounts, it leads to dangerous exposure.
As a result, despite all the efforts to combat it, good ol’ phishing is still with us. In fact, according to the 2024 Verizon Data Breach Investigations Report (DBIR), phishing is responsible for 40% of data breaches.
The problem, however, is that browser extensions are routinely granted extensive permissions, including passwords, cookies, session tokens, and more. Malicious browser extensions use these extensive permissions to steal data from users’ computers and have become a significant source of credential theft.
Actionable measures to mitigate the risk:
The techniques mentioned above are but a glimpse of the array of methods hackers use to steal user credentials. Nevertheless, there are several commonsense and actionable steps that organizations can take to vastly reduce the risk:
How LayerX Mitigates Snowflake Credential Exposure
LayerX is a browser security platform that natively integrates with any browser. It provides continuous monitoring, risk analysis, and real-time enforcement of any event and user activity in the browsing session.
LayerX can help mitigate the risk of Snowflake credential exposure in several ways:
Contact us today to schedule a demo and see how LayerX can help protect you!
Helping Enterprises Protect Their Browsers @ LayerX
6moThe ability to track credential usage, enforce password changes, and mandate SSO with MFA are crucial steps in enhancing security.