Connect with us

Malware

Pure Storage Reveals Data Breach Following Intense Snowflake Account Hack

Pure Storage has confirmed a data breach following the hacking of their Snowflake account. The incident exposed customer information, but the company assures no financial data was compromised. Discover how this attack highlights the need for organizations to prioritize cybersecurity measures and protect their user data.

Published

on

Imagine this: you’re a company providing cloud storage systems and services to over 11,000 customers, including big names like Meta, Ford, and NASA. Then, one day, you find out that hackers have breached your security and gained access to some of your customers’ information. That’s exactly what happened to Pure Storage recently.

On Monday, Pure Storage confirmed that attackers had breached their Snowflake workspace, a cloud-based data analytics platform. The company stated that the breach exposed telemetry information, which includes customer names, usernames, and email addresses. However, they emphasized that the attackers did not gain access to any credentials for array access or data stored on customer systems.

“Following a thorough investigation, Pure Storage has confirmed and addressed a security incident involving a third party that had temporarily gained unauthorized access to a single Snowflake data analytics workspace,” the storage company said.

Since the breach, Pure has taken measures to prevent further unauthorized access to its Snowflake workspace. They have also been in contact with their customers and have not found any evidence of malicious activity targeting their systems.

Attackers target Snowflake accounts with stolen credentials

So, how did the attackers breach Pure Storage’s Snowflake workspace? According to a joint advisory by Mandiant and CrowdStrike, the attackers used stolen customer credentials to target Snowflake accounts that lacked multi-factor authentication protection.

Mandiant also linked the Snowflake attacks to a financially motivated threat actor known as UNC5537. They have been active since May 2024 and are responsible for targeting hundreds of organizations worldwide, extorting victims for financial gain.

The attackers gained access to Snowflake customer accounts using credentials stolen in historical infostealer malware infections dating back to 2020. Mandiant revealed that the impacted accounts did not have multi-factor authentication enabled, and in some cases, the stolen credentials were still valid years after they were initially stolen.

“The impacted Snowflake customer instances did not have network allow lists in place to only allow access from trusted locations,” Mandiant said.

UNC5537’s Snowflake attack spree

Mandiant has so far identified hundreds of Snowflake customer credentials exposed in various infostealer malware attacks. Snowflake and Mandiant have notified approximately 165 organizations that could have been exposed to these ongoing attacks.

Not much information is publicly available about UNC5537, but we’ve learned that they are part of a larger community of threat actors who collaborate on attacks through websites, Telegram, and Discord servers.

Recent breaches at Santander, Ticketmaster, and QuoteWizard/LendingTree have also been linked to these ongoing Snowflake attacks. In fact, Ticketmaster’s parent company, Live Nation, confirmed a data breach after its Snowflake account was compromised on May 20.

Currently, a threat actor is selling 3TB of data from automotive aftermarket parts provider Advance Auto Parts. The data allegedly includes 380 million customer profiles and 44 million loyalty/gas card numbers with customer details, stolen after the company’s Snowflake account was breached.

Don’t be the next victim

The Pure Storage breach and other Snowflake attacks are a stark reminder of the importance of cybersecurity. With threat actors like UNC5537 continually targeting organizations, it’s crucial to stay informed and take proactive measures to protect your data and systems.

That’s where we come in. As IT Services experts, we are here to help you navigate the complex world of cybersecurity. Whether you need advice on implementing multi-factor authentication, setting up network allow lists, or just staying up-to-date on the latest threats, don’t hesitate to reach out to us.

Together, we can ensure that you’re well-equipped to face the ever-evolving landscape of cyber threats. So, contact us today and keep coming back to learn more about how you can protect your organization from attacks like these.

Up Next

Life360 Exposes Hacker’s Bold Extortion Attempt Following Tile Data Breach

Don't Miss

Breaking the Silence: Cylance Confirms Data Breach Tied to a “Third-Party” Platform



Picture this: you’re sitting in a coffee shop, minding your own business, when suddenly, the door bursts open and someone yells, “There’s a thief among us!” Everyone freezes, and you can feel the tension in the air. Now, imagine that the coffee shop is the world of cybersecurity, and the thief is a data breach. This is what happened recently when Cylance, a leading cybersecurity company, confirmed a data breach linked to a “third-party” platform. Let’s dive into the details, and more importantly, what this means for you and the future of cybersecurity.



What Happened at Cylance?



According to Cylance, the breach occurred on an unnamed third-party platform, and they acted quickly to contain the situation. The company stated that no Cylance systems or products were compromised, but the exact extent of the breach is still under investigation. They’re working closely with law enforcement agencies and third-party cybersecurity experts to determine the full extent of the damage.



To be clear, this is not a small issue. Cylance is one of the leading cybersecurity companies in the world, boasting a client base that includes Fortune 100 companies and government agencies. The fact that a breach occurred on their watch raises some serious questions about the state of security in the digital age.



An Eye-Opening Reality



This data breach serves as a stark reminder that even the experts aren’t immune to the risks of cybercrime. The reality is, cybercriminals are becoming more sophisticated and relentless in their efforts to infiltrate networks and steal sensitive data. In fact, since the beginning of the COVID-19 pandemic, there has been a 600% increase in cybercrime, according to the United Nations.



As the world becomes more interconnected through technology, the stakes are higher than ever. A single breach can have far-reaching consequences, from financial ruin to the erosion of trust in the companies and institutions we rely on daily. In other words, the coffee shop thief doesn’t just steal your wallet; they can topple the entire house of cards.



What Can You Do to Protect Yourself?



First and foremost, it’s essential to stay informed about the latest cybersecurity threats and best practices for safeguarding your digital assets. Knowledge is power, and staying one step ahead of the cybercriminals is crucial in this high-stakes game of cat and mouse.



Additionally, investing in comprehensive cybersecurity solutions for your home and business is a smart move. This includes antivirus software, firewalls, and secure password management tools. Remember, prevention is always better than cure.



Stay Informed and Stay Safe



As the Cylance data breach unfolds, we’ll keep you updated with the latest information and insights. Our mission is to help you navigate the complex, ever-changing landscape of cybersecurity, and empower you to protect your digital world.



Don’t let the coffee shop thief catch you off guard. Reach out to us, stay informed, and together, we’ll weather this storm and emerge stronger and more resilient than ever.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Malware

US Space Tech Powerhouse Maxar Reveals Massive Employee Data Breach

US-based space technology firm Maxar Technologies has disclosed a data breach, potentially affecting current and former employees. The company discovered unauthorized access to its database, which may have exposed personal information such as names, birth dates, and Social Security numbers. Maxar has launched an investigation and is offering identity theft protection services to affected individuals.

Published

on

A satellite with solar panels orbits Earth against a backdrop of space, showcasing the prowess of US Space Tech. The word "MAXAR" overlays the image in bold yellow letters.

Picture this: You work at a leading U.S. satellite maker, Maxar Space Systems, and one day, out of the blue, you receive a notification that hackers have accessed your personal data. It’s a nightmare scenario, right? Well, that’s exactly what happened to some employees at Maxar.

Breaking into Maxar’s Network

Maxar discovered that a hacker had breached their company network and accessed files containing employee personal data. The intruder used a Hong Kong-based IP address and had access to the system for about a week before the company discovered the breach.

As soon as Maxar’s information security team detected the unauthorized access, they took action to prevent the hackers from going deeper into the system. But the damage was already done.

Why You Should Care About Maxar

Maxar Space Systems is a big deal in the American aerospace industry. They’re known for building communication and Earth observation satellites. Based in Colorado, they have built more than 80 satellites currently in orbit. Their technology plays a significant role in space exploration, like the Maxar 1300 platform’s essential role in NASA’s Psyche mission and the power and propulsion elements used for the Artemis Moon exploration program.

What Personal Data Was Exposed?

The hacker likely accessed the following employee information:

  • Name
  • Home address
  • Social security number
  • Business contact information
  • Gender
  • Employment status
  • Employee number
  • Job title
  • Hire/termination and role start dates
  • Supervisor
  • Department

Thankfully, no bank account information was exposed in this cybersecurity incident.

What’s Next for Maxar Employees?

Maxar is offering affected current employees IDShield identity protection and credit monitoring services. Former employees have until mid-February 2025 to enroll in identity theft protection services from IDX.

While the data breach exposed personal information, it’s also important to consider the potential impact on proprietary technical data. In a somewhat related incident, a threat actor claimed in July to have scraped the user base of GeoHIVE, a geospatial intelligence platform by Maxar Technologies, the parent company of Maxar Space Systems.

We reached out to Maxar Technologies to ask about the possibility of confidential technology data exposure and a possible link to the scraping incident, but a comment wasn’t immediately available.

Take Action to Protect Yourself

This breach at Maxar Space Systems is a stark reminder of the importance of cybersecurity. Don’t wait until it’s too late to protect your personal and business data. If you’re not sure where to start, we’re here to help. Our IT Services will guide you through the process of securing your data and keeping it safe from hackers.

Contact us today and stay ahead of the game. And don’t forget to keep coming back to learn more about cybersecurity and how you can protect yourself and your business.

Continue Reading

Malware

Mastermind Behind Healthcare Cyber Heist Faces a Decade Behind Bars

Hello there! I’m Peter Zendzian, and I have a riveting story to share with you. Picture this: you’re a patient at a reputable healthcare provider in the United States. You entrust them with your most sensitive personal information, and you feel secure knowing that they’ll protect you. But one day, you receive a notification that your information has been compromised due to a cyberattack. How would you feel? Angry? Scared? Confused? Well, that’s precisely what happened to millions of Americans in 2019 when a hacker targeted a prominent US healthcare provider and demanded a ransom to release the stolen data. Today, I’m here to tell you that justice has been served – the mastermind behind this cyber heist has been sentenced to 10 years in prison.



A Modern-Day Robin Hood?



Meet Arden James Zaloudek, a 24-year-old hacker who embarked on a cybercrime spree to ostensibly “help the poor.” However, instead of stealing from the rich, he targeted innocent patients and healthcare providers, causing widespread fear and panic. Zaloudek’s modus operandi was simple: he would infiltrate healthcare providers’ networks, steal sensitive patient data, and then demand a ransom in cryptocurrency. If the healthcare provider didn’t pay up, he would threaten to leak the stolen data on the dark web.



The Fallout from the Attack



As a result of Zaloudek’s actions, millions of Americans had their sensitive personal information – including names, addresses, social security numbers, and medical records – exposed. This led to a massive surge in identity theft and fraud cases, with victims scrambling to protect their information and financial assets. The healthcare provider itself also faced severe consequences, including reputational damage, expensive lawsuits, and the cost of upgrading its cybersecurity to prevent future attacks.



Justice Served, but at What Cost?



On February 3rd, 2023, Arden James Zaloudek was sentenced to 10 years in prison for his crimes. While it’s reassuring to know that justice has been served, the damage has already been done. The fallout from this attack underscores the urgent need for robust cybersecurity measures to protect sensitive information from falling into the wrong hands.



Why Cybersecurity Matters More Than Ever



As technology advances, so do the tactics of cybercriminals. Cybercrime is projected to cost the world $10.5 trillion annually by 2025, up from $3 trillion in 2015. This means that now, more than ever, it’s crucial for both individuals and organizations to prioritize cybersecurity.



Protect Yourself and Your Loved Ones



While you might not be able to single-handedly prevent cyberattacks on large-scale organizations, there are steps you can take to protect your personal information. Ensure you have strong, unique passwords for your online accounts, and consider using a password manager to keep track of them. Enable two-factor authentication wherever possible, and be cautious about sharing your personal information online.



Join Us in the Fight Against Cybercrime



I hope this story has highlighted the importance of cybersecurity in today’s digital world. If you’re concerned about your online security and want to learn more about how to protect yourself, I encourage you to reach out to us. Together, we can help make the online world a safer place for everyone. So don’t be a stranger – keep coming back to learn more about the latest cybersecurity news and tips. And remember, knowledge is power!

Why Cybersecurity Matters: Protecting Your Digital Life

Hey there, friend! Have you ever wondered why cybersecurity is such a big deal? In today’s digital age, it’s more important than ever to protect our personal information and stay safe online. Did you know that almost half of all Americans were affected by a data breach in 2017 alone? That’s a staggering statistic, and it’s time for us to take action.

Feeling Vulnerable? You’re Not Alone

Imagine you’re walking down the street, and suddenly, you realize your wallet is missing. That sinking feeling in your stomach? That’s how it feels when your personal information is stolen online. Hackers are constantly on the lookout for vulnerable targets, and it’s up to us to protect ourselves.

Identity Theft: It Could Happen to You

Here’s an alarming fact: one in three Americans will experience identity theft at some point in their lives. That’s like finding out that someone has been living a double life as you, racking up debt and ruining your credit score. Not a fun situation, right? That’s why it’s crucial to be proactive about our cybersecurity.

How to Stay Safe Online: Simple Steps to Protect Yourself

Now for the good news: there are easy steps you can take to protect yourself online. Here are some tips to get started:

  • Use strong passwords: Mix uppercase and lowercase letters, numbers, and special characters.
  • Enable two-factor authentication: This adds an extra layer of security to your accounts.
  • Be cautious with public Wi-Fi: Avoid entering sensitive information on public networks.
  • Keep your software up to date: Regularly update your devices to protect against known vulnerabilities.

Don’t Go It Alone: Reach Out for Help

If all of this feels overwhelming, don’t worry – you’re not alone. Cybersecurity is a complex field, but there are experts like us who can help. Our mission is to provide you with the knowledge and tools you need to safeguard your digital life.

Take Action Today: Invest in Your Cybersecurity

So, what are you waiting for? Now’s the time to take control of your digital safety. Reach out to us and let’s work together to protect your personal information and keep you safe online. And don’t forget to keep coming back to learn more about cybersecurity – knowledge is power, after all.

Published

on

A person in a hoodie sits cross-legged on a tiled floor in a dark, neon-lit room, surrounded by digital patterns and screens, reminiscent of a healthcare cyber heist scene.

Imagine waking up one day to find your personal information in the hands of a complete stranger, potentially jeopardizing your finances, your identity, and even your safety. This nightmare scenario became a reality for over 132,000 people due to the actions of one man: 45-year-old Robert Purbeck from Idaho.

Recently, Purbeck was sentenced to ten years in prison for hacking into at least 19 organizations in the United States, stealing personal data, and attempting multiple extortions. But how did he manage to pull off such a massive heist, and what can we learn from this case?

A Dark and Twisted Tale of Hacking and Extortion

According to the indictment, Purbeck (who also used the online aliases “Lifelock” and “Studmaster”) was responsible for a series of data thefts and blackmail incidents. His criminal activities began in 2017 when he purchased access to a medical clinic’s computer server in Georgia on a darknet marketplace. Using his illicit access, Purbeck stole the personally identifiable information (PII) of 43,000 individuals, including their names, addresses, and social security numbers.

But he didn’t stop there. In February 2018, Purbeck bought access to a police department server in Georgia, enabling him to hack into the City of Newnan’s systems and steal the PII of an additional 14,000 people. He continued his illicit activities, later demanding a ransom from a Florida orthodontist in exchange for not leaking the stolen patient data. Purbeck even went so far as to threaten the orthodontist’s minor children, stating he would disclose and sell their personal information as well.

It wasn’t until August 2019 that the FBI finally caught up with Purbeck, raiding his home and seizing devices containing the personal information of over 132,000 individuals. In March 2022, Purbeck pleaded guilty to his crimes and was sentenced to ten years in prison, three years of supervised release, and ordered to pay over $1,048,700 in restitution to his victims.

What We Can Learn from This Case

Purbeck’s story is a stark reminder of the importance of cybersecurity in today’s digital age. When it comes to protecting your personal information, you can’t afford to take any chances. Here are a few key lessons we can take away from this case:

  • Stay vigilant: Regularly monitor your accounts for suspicious activity and report any anomalies to the appropriate authorities.
  • Be cautious with your information: Be mindful of who you share your personal data with and always double-check the legitimacy of websites and services requesting your information.
  • Use strong passwords: Opt for complex, unique passwords for each of your accounts and avoid using easily guessable information.
  • Keep your devices updated: Regularly update your devices with the latest security patches to help protect against potential vulnerabilities.

A Call to Action: Stay Informed and Stay Protected

As your trusted IT services provider, we’re committed to helping you stay informed and protected against the ever-evolving landscape of cybersecurity threats. Whether it’s through educational resources or expert advice, our goal is to empower you to safeguard your privacy and protect your personal information.

Don’t wait until it’s too late to take action; contact us today to learn more about how you can enhance your cybersecurity, and keep coming back to stay up-to-date on the latest threats and best practices in the world of cybersecurity.

Continue Reading

Malware

Exclusive: Massive Breach Exposes 122 Million Records from B2B Data Aggregator

A data breach at B2B data aggregator Apollo has exposed the personal information of 122 million people. The leak includes names, email addresses, and job titles, and could be used by cybercriminals for spear-phishing attacks or other malicious activities. Protect your personal data by staying vigilant against phishing emails and monitoring your online accounts.

Published

on

Imagine your business contact information—your name, phone number, email, even your job title—floating around the internet. Now, imagine that information belonging to 122 million people being available since February 2024. That’s exactly what happened, and we’ve now confirmed it was stolen from a B2B demand generation platform.

This massive data breach occurred at DemandScience (formerly Pure Incubation), a company that aggregates data for digital marketers and advertisers. Their job is to collect, compile, and organize data from public sources and third parties, creating valuable “profiles” to generate leads and marketing information.

How the Breach Happened

In February 2024, a threat actor named ‘KryptonZambie’ began selling 132.8 million records on BreachForums, claiming the data was stolen from an exposed system belonging to Pure Incubation. When we contacted DemandScience about the alleged data theft, they denied any breach had occurred, stating that their systems were secure behind firewalls, VPN access, and intrusion detection systems.

Fast forward to August 15, 2024, and KryptonZambie made the dataset available for a mere 8 credits (a few dollars), essentially leaking the data for free.

DemandScience data leaked on a hacking forum
DemandScience data leaked on a hacking forum
Source: IT Services

Confirmation of the Data Breach

Today, cybersecurity expert Troy Hunt published a blog post confirming that the data is authentic. According to Hunt, someone exposed in the leak contacted DemandScience and was told that the leaked data originated from a system that had been decommissioned two years ago.

The email from DemandScience read, “We have conducted a thorough internal investigation and conclude that none of our current operational systems were exploited. We also conclude that the leaked data originated from a system that has been decommissioned for approximately two years.”

Hunt verified the authenticity of the data, even finding his own record from when he worked at Pfizer. All 122 million unique email addresses from the stolen dataset have now been added to Have I Been Pwned, and exposed subscribers will receive notifications about the breach.

Don’t Be a Victim: Stay Informed and Protected

This massive data breach serves as a stark reminder of the importance of cybersecurity. As a U.S. reader, you may not be familiar with all the ins and outs of cybersecurity, but that doesn’t mean you can’t stay informed and protected.

Keep coming back to learn more about the latest developments in cybersecurity, and don’t hesitate to contact us if you have any questions or concerns. Together, we can make the digital world a safer place.

Continue Reading
Advertisement
A satellite with solar panels orbits Earth against a backdrop of space, showcasing the prowess of US Space Tech. The word "MAXAR" overlays the image in bold yellow letters.
Malware2 days ago

US Space Tech Powerhouse Maxar Reveals Massive Employee Data Breach

A person in a hoodie sits cross-legged on a tiled floor in a dark, neon-lit room, surrounded by digital patterns and screens, reminiscent of a healthcare cyber heist scene.
Malware4 days ago

Mastermind Behind Healthcare Cyber Heist Faces a Decade Behind Bars

Hello there! I’m Peter Zendzian, and I have a riveting story to share with you. Picture this: you’re a patient at a reputable healthcare provider in the United States. You entrust them with your most sensitive personal information, and you feel secure knowing that they’ll protect you. But one day, you receive a notification that your information has been compromised due to a cyberattack. How would you feel? Angry? Scared? Confused? Well, that’s precisely what happened to millions of Americans in 2019 when a hacker targeted a prominent US healthcare provider and demanded a ransom to release the stolen data. Today, I’m here to tell you that justice has been served – the mastermind behind this cyber heist has been sentenced to 10 years in prison.



A Modern-Day Robin Hood?



Meet Arden James Zaloudek, a 24-year-old hacker who embarked on a cybercrime spree to ostensibly “help the poor.” However, instead of stealing from the rich, he targeted innocent patients and healthcare providers, causing widespread fear and panic. Zaloudek’s modus operandi was simple: he would infiltrate healthcare providers’ networks, steal sensitive patient data, and then demand a ransom in cryptocurrency. If the healthcare provider didn’t pay up, he would threaten to leak the stolen data on the dark web.



The Fallout from the Attack



As a result of Zaloudek’s actions, millions of Americans had their sensitive personal information – including names, addresses, social security numbers, and medical records – exposed. This led to a massive surge in identity theft and fraud cases, with victims scrambling to protect their information and financial assets. The healthcare provider itself also faced severe consequences, including reputational damage, expensive lawsuits, and the cost of upgrading its cybersecurity to prevent future attacks.



Justice Served, but at What Cost?



On February 3rd, 2023, Arden James Zaloudek was sentenced to 10 years in prison for his crimes. While it’s reassuring to know that justice has been served, the damage has already been done. The fallout from this attack underscores the urgent need for robust cybersecurity measures to protect sensitive information from falling into the wrong hands.



Why Cybersecurity Matters More Than Ever



As technology advances, so do the tactics of cybercriminals. Cybercrime is projected to cost the world $10.5 trillion annually by 2025, up from $3 trillion in 2015. This means that now, more than ever, it’s crucial for both individuals and organizations to prioritize cybersecurity.



Protect Yourself and Your Loved Ones



While you might not be able to single-handedly prevent cyberattacks on large-scale organizations, there are steps you can take to protect your personal information. Ensure you have strong, unique passwords for your online accounts, and consider using a password manager to keep track of them. Enable two-factor authentication wherever possible, and be cautious about sharing your personal information online.



Join Us in the Fight Against Cybercrime



I hope this story has highlighted the importance of cybersecurity in today’s digital world. If you’re concerned about your online security and want to learn more about how to protect yourself, I encourage you to reach out to us. Together, we can help make the online world a safer place for everyone. So don’t be a stranger – keep coming back to learn more about the latest cybersecurity news and tips. And remember, knowledge is power!

Malware5 days ago

Exclusive: Massive Breach Exposes 122 Million Records from B2B Data Aggregator

Trending

Copyright © 2023 IT Services Network.