<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:breach="https://breachnotes.vulnetix.com/xmlns/breach/1.0"><channel><title>Cloud</title><link>https://breachnotes.vulnetix.com/cloud/</link><description>Cloud and SaaS security incidents including misconfigurations, credential theft, and shared responsibility failures</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>Breach Notes Project</managingEditor><lastBuildDate>Sun, 12 Apr 2026 12:18:39 +0000</lastBuildDate><atom:link href="https://breachnotes.vulnetix.com/cloud/index.xml" rel="self" type="application/rss+xml"/><item><title>Cisco Source Code Stolen via Trivy Supply Chain Attack (TeamPCP)</title><link>https://breachnotes.vulnetix.com/cloud/2026-04_cisco-trivy-teampcp-source-code/</link><pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-04_cisco-trivy-teampcp-source-code/</guid><description>In early April 2026, Cisco disclosed that attackers leveraged credentials stolen through the March 2026 Trivy supply chain compromise (attributed to TeamPCP / UNC6780) to penetrate Cisco's internal development and build environment. The malicious GitHub Action plugin from the Trivy compromise was …</description><content:encoded><![CDATA[In early April 2026, Cisco disclosed that attackers leveraged credentials stolen through the March 2026 Trivy supply chain compromise (attributed to TeamPCP / UNC6780) to penetrate Cisco&rsquo;s internal development and build environment. The malicious GitHub Action plugin from the Trivy compromise was used to steal credentials and data. More than 300 GitHub repositories were cloned, and AWS keys were allegedly stolen. Exposed material reportedly includes source code tied to AI-related projects, with some repositories allegedly connected to corporate customers. Dozens of developer and lab workstations were impacted. Cisco&rsquo;s Unified Intelligence Center, CSIRT, and EOC teams contained the breach. TeamPCP (also tracked by Google GTIG as UNC6780) is the same threat group behind the LiteLLM/PyPI → Mercor breach (March 2026) and the Trivy → European Commission AWS breach (March 2026). The group has been conducting a series of supply chain attacks targeting developer platforms including GitHub, PyPI, NPM, and Docker using their &lsquo;TeamPCP Cloud Stealer&rsquo; infostealer.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/</breach:sourceUrl><breach:dateOfBreach>2026-04-03</breach:dateOfBreach><breach:dateOfDisclosure>2026-04-03</breach:dateOfDisclosure><breach:initialAttackVector>TeamPCP (UNC6780) leveraged credentials stolen via the March 2026 Trivy vulnerability scanner supply chain compromise to breach Cisco's internal development and build environment via a malicious GitHub Action plugin</breach:initialAttackVector><breach:vendorProduct>Trivy (open-source vulnerability scanner); GitHub Actions</breach:vendorProduct><breach:softwarePackage>Trivy</breach:softwarePackage><breach:malware>TeamPCP Cloud Stealer</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>European Commission ShinyHunters Cloud Breach via Trivy Supply Chain</title><link>https://breachnotes.vulnetix.com/cloud/2026-03_european-commission-shinyhunters-aws/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-03_european-commission-shinyhunters-aws/</guid><description>On March 19, 2026, ShinyHunters obtained an AWS API key belonging to the European Commission's cloud environment via a prior compromise of the open-source security tool Trivy. This enabled unauthorized access to the EC's AWS infrastructure. CERT-EU confirmed the breach on March 30, 2026, reporting …</description><content:encoded>On March 19, 2026, ShinyHunters obtained an AWS API key belonging to the European Commission&amp;rsquo;s cloud environment via a prior compromise of the open-source security tool Trivy. This enabled unauthorized access to the EC&amp;rsquo;s AWS infrastructure. CERT-EU confirmed the breach on March 30, 2026, reporting that over 350 GB of data was exfiltrated, including emails and attachments, SSO user directory dumps, DKIM signing keys, AWS configuration snapshots, NextCloud/Athena data, and internal admin URLs. Data of at least 29 other EU entities may have been affected. The DKIM key theft enables ShinyHunters to forge authenticated emails from EU Commission domains. The breach is part of a broader ShinyHunters campaign targeting cloud credentials in 2026.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/european-commission-confirms-data-breach-after-europaeu-hack/</breach:sourceUrl><breach:dateOfBreach>2026-03-19</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-30</breach:dateOfDisclosure><breach:initialAttackVector>Attackers compromised the open-source security tool Trivy in a supply chain attack; a secret AWS API key associated with the European Commission's account was embedded in Trivy data and extracted by ShinyHunters, enabling access to the EC's AWS cloud environment</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services; Trivy (open-source container scanner)</breach:vendorProduct><breach:softwarePackage>Trivy</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>TeamPCP Trivy/Aqua Security GitHub Actions Supply Chain Compromise (CVE-2026-33634)</title><link>https://breachnotes.vulnetix.com/cloud/2026-03_teampcp-trivy-github-actions/</link><pubDate>Thu, 19 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-03_teampcp-trivy-github-actions/</guid><description>On March 19, 2026, TeamPCP (tracked by Google GTIG as UNC6780) began the first stage of a cascading multi-tool supply chain campaign by exploiting a misconfigured GitHub Actions workflow in Aqua Security's Trivy open-source vulnerability scanner. The group compromised the aqua-bot service account …</description><content:encoded><![CDATA[On March 19, 2026, TeamPCP (tracked by Google GTIG as UNC6780) began the first stage of a cascading multi-tool supply chain campaign by exploiting a misconfigured GitHub Actions workflow in Aqua Security&rsquo;s Trivy open-source vulnerability scanner. The group compromised the aqua-bot service account and force-pushed malicious code to 76 of 77 version tags in aquasecurity/trivy-action and all tags in aquasecurity/setup-trivy. The malicious workflow injected TeamPCP&rsquo;s three-stage &lsquo;Cloud Stealer&rsquo; payload that exfiltrates SSH keys, Git credentials, AWS/GCP/Azure/Kubernetes/Docker secrets, .env files, database credentials, VPN configs, cryptocurrency wallet data, and Slack/Discord webhooks. This initial compromise served as the origin point for a cascading campaign that subsequently compromised Checkmarx KICS (March 21), LiteLLM/PyPI (March 27 — leading to the Mercor breach), Telnyx/PyPI (March 27), and the European Commission AWS environment and Cisco development environment. CISA added CVE-2026-33634 to the KEV catalog. The full downstream impact affected thousands of CI/CD pipelines that used these GitHub Actions.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://unit42.paloaltonetworks.com/teampcp-supply-chain-attacks/</breach:sourceUrl><breach:dateOfBreach>2026-03-19</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-21</breach:dateOfDisclosure><breach:initialAttackVector>TeamPCP (UNC6780) exploited a misconfigured GitHub Actions workflow in Aqua Security's Trivy vulnerability scanner repository, compromising the aqua-bot service account to execute an imposter commit attack that force-pushed malicious code to 76 of 77 version tags across aquasecurity/trivy-action and aquasecurity/setup-trivy</breach:initialAttackVector><breach:cve>CVE-2026-33634</breach:cve><breach:vendorProduct>Trivy (open-source vulnerability scanner by Aqua Security); GitHub Actions</breach:vendorProduct><breach:softwarePackage>trivy-action, setup-trivy</breach:softwarePackage><breach:malware>TeamPCP Cloud Stealer</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>GitHub</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Crunchyroll Data Breach via BPO Okta Compromise</title><link>https://breachnotes.vulnetix.com/cloud/2026-03_crunchyroll-bpo-okta-breach/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-03_crunchyroll-bpo-okta-breach/</guid><description>On March 12, 2026, a threat actor gained access to Crunchyroll's customer support ticketing system after compromising an Okta account belonging to an employee of Telus Digital, Crunchyroll's business process outsourcing (BPO) partner. The attacker exfiltrated over 8 million customer support tickets …</description><content:encoded>On March 12, 2026, a threat actor gained access to Crunchyroll&amp;rsquo;s customer support ticketing system after compromising an Okta account belonging to an employee of Telus Digital, Crunchyroll&amp;rsquo;s business process outsourcing (BPO) partner. The attacker exfiltrated over 8 million customer support tickets containing data for approximately 6.8 million unique users. Exposed data included names, login names, email addresses, IP addresses, geographic location, and contents of support tickets (some of which contained partial or full payment card numbers). The attacker demanded a $5 million extortion payment from Crunchyroll, which did not respond. A class action lawsuit was filed in March 2026 alleging Crunchyroll failed to implement adequate security controls for its BPO partners. This breach is likely related to the simultaneous large-scale ShinyHunters campaign against Telus Digital itself (see 2026-03_telus-digital-shinyhunters.yaml), which occurred on the same date and also involved compromised Okta SSO accounts at Telus.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/</breach:sourceUrl><breach:dateOfBreach>2026-03-12</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-24</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2026-03-24</breach:dateOfCustomerNotification><breach:initialAttackVector>Threat actor compromised an Okta SSO account belonging to a support agent at Telus (Crunchyroll's BPO partner); malware on the employee's device harvested credentials used to access Crunchyroll's support ticket system</breach:initialAttackVector><breach:vendorProduct>Okta (identity/SSO); Telus (BPO/outsourcing)</breach:vendorProduct><breach:malware>infostealer (unspecified)</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Anodot SaaS Integrator Breach - ShinyHunters Snowflake Token Theft</title><link>https://breachnotes.vulnetix.com/cloud/2026-04_anodot-shinyhunters-snowflake-tokens/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-04_anodot-shinyhunters-snowflake-tokens/</guid><description>In April 2026, ShinyHunters disclosed that they had breached Anodot (an Israeli AI analytics company acquired by Glassbox in November 2025), maintaining access 'for some time.' By stealing authentication tokens from Anodot's systems, they accessed Snowflake environments of over a dozen downstream …</description><content:encoded>In April 2026, ShinyHunters disclosed that they had breached Anodot (an Israeli AI analytics company acquired by Glassbox in November 2025), maintaining access &amp;lsquo;for some time.&amp;rsquo; By stealing authentication tokens from Anodot&amp;rsquo;s systems, they accessed Snowflake environments of over a dozen downstream Anodot customers. ShinyHunters then launched extortion campaigns against victim companies. ShinyHunters also confirmed they attempted to pivot into Salesforce from Anodot but failed. This incident mirrors the 2024 UNC5537/Snowflake campaign and reflects a recurring pattern of supply chain compromise via SaaS integration platforms to gain downstream access to Snowflake data environments.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/snowflake-customers-hit-in-data-theft-attacks-after-saas-integrator-breach/</breach:sourceUrl><breach:dateOfBreach>2026-03-01</breach:dateOfBreach><breach:dateOfDisclosure>2026-04-07</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2026-04-07</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters maintained persistent access to Anodot's (an AI analytics SaaS integrator) infrastructure and stole authentication tokens used to connect Anodot to downstream customer Snowflake environments</breach:initialAttackVector><breach:vendorProduct>Anodot (AI analytics/SaaS integration platform); Snowflake (cloud data warehouse)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>UNC6426 nx npm Supply Chain → AWS Admin Takeover (72 Hours)</title><link>https://breachnotes.vulnetix.com/cloud/2026-03_unc6426-nx-npm-aws-takeover/</link><pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-03_unc6426-nx-npm-aws-takeover/</guid><description>In March 2026, UNC6426 demonstrated a sophisticated attack chain converting a stolen developer GitHub Personal Access Token (from the 2025 nx npm supply chain compromise) into full AWS administrator access within 72 hours. The threat actor used the Nord Stream tool to extract secrets from CI/CD …</description><content:encoded><![CDATA[In March 2026, UNC6426 demonstrated a sophisticated attack chain converting a stolen developer GitHub Personal Access Token (from the 2025 nx npm supply chain compromise) into full AWS administrator access within 72 hours. The threat actor used the Nord Stream tool to extract secrets from CI/CD environments, then abused the GitHub-to-AWS OIDC trust relationship to generate temporary AWS STS tokens for the victim&rsquo;s &lsquo;Actions-CloudFormation&rsquo; IAM role. UNC6426 then created a new IAM role with AdministratorAccess attached. With full AWS admin access, the attacker enumerated and accessed S3 buckets, terminated production EC2 and RDS instances, decrypted application keys, renamed all victim GitHub repositories to &lsquo;/s1ngularity-repository-[randomchars]&rsquo; and made them public. The incident illustrates how OIDC trust chain abuse can amplify the impact of npm supply chain credential theft far beyond the original package compromise.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://thehackernews.com/2026/03/unc6426-exploits-nx-npm-supply-chain.html</breach:sourceUrl><breach:dateOfBreach>2026-03-01</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-11</breach:dateOfDisclosure><breach:initialAttackVector>UNC6426 leveraged credentials (GitHub Personal Access Token) stolen during the 2025 nx npm package supply chain compromise to abuse GitHub-to-AWS OpenID Connect (OIDC) trust, escalating from a developer PAT to full AWS AdministratorAccess within 72 hours</breach:initialAttackVector><breach:vendorProduct>nx (npm build tool); AWS; GitHub Actions OIDC</breach:vendorProduct><breach:softwarePackage>nx</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Hims &amp; Hers Zendesk Support Breach via ShinyHunters Okta Campaign</title><link>https://breachnotes.vulnetix.com/cloud/2026-02_hims-hers-zendesk-shinyhunters/</link><pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-02_hims-hers-zendesk-shinyhunters/</guid><description>Between February 4–7, 2026, threat actors used a compromised Okta SSO account to access Hims &amp; Hers' Zendesk support instance and exfiltrate customer support tickets. The breach was detected February 5 and investigated through March 3. ShinyHunters conducted the breach as part of a broader campaign …</description><content:encoded>Between February 4–7, 2026, threat actors used a compromised Okta SSO account to access Hims &amp;amp; Hers&amp;rsquo; Zendesk support instance and exfiltrate customer support tickets. The breach was detected February 5 and investigated through March 3. ShinyHunters conducted the breach as part of a broader campaign targeting Okta SSO accounts to pivot into SaaS platforms. Exposed data included names, contact information, and contents of support requests; no medical records or doctor communications were compromised. Hims &amp;amp; Hers has not disclosed the number of affected individuals. The breach is related to simultaneous ShinyHunters campaigns against Telus Digital and other companies.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/hims-and-hers-warns-of-data-breach-after-zendesk-support-ticket-breach/</breach:sourceUrl><breach:dateOfBreach>2026-02-04</breach:dateOfBreach><breach:dateOfDisclosure>2026-04-03</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2026-04-03</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters compromised an Okta SSO account to access Hims &amp; Hers' Zendesk customer support instance</breach:initialAttackVector><breach:vendorProduct>Zendesk (customer support platform); Okta (identity/SSO)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Zendesk</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>DOGE Uploads Sensitive Social Security Administration Data to External Cloud Server</title><link>https://breachnotes.vulnetix.com/cloud/2026-01_breach-roundup-doge-uploaded-social-security-data-to-cloud/</link><pubDate>Thu, 22 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-01_breach-roundup-doge-uploaded-social-security-data-to-cloud/</guid><description>The Department of Government Efficiency (DOGE) — the advisory body established by the Trump administration —
was reported to have transferred sensitive Social Security Administration (SSA) data to an external cloud
server outside of SSA's secure federal information systems. The data transfer raised …</description><content:encoded>The Department of Government Efficiency (DOGE) — the advisory body established by the Trump administration —
was reported to have transferred sensitive Social Security Administration (SSA) data to an external cloud
server outside of SSA&amp;rsquo;s secure federal information systems. The data transfer raised severe concerns about the
security and privacy of Social Security records for approximately 280 million Americans, including SSNs,
benefit payment records, and disability status information. Multiple privacy advocacy groups and former SSA
officials raised alarms about inadequate data protection for the transferred data. Congressional oversight
committees were notified. The incident prompted lawsuits from privacy organizations seeking to halt further
unauthorized data transfers. The action raised questions about compliance with the Privacy Act of 1974, the
Federal Information Security Management Act (FISMA), and SSA&amp;rsquo;s own data protection policies.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.databreachtoday.com/breach-roundup-doge-uploaded-social-security-data-to-cloud-a-30586</breach:sourceUrl><breach:dateOfBreach>2026-01-22</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-22</breach:dateOfDisclosure><breach:initialAttackVector>DOGE (Department of Government Efficiency) transferred sensitive Social Security Administration data to an external cloud server without standard federal data security controls</breach:initialAttackVector><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Betterment Data Breach - ShinyHunters Vishing (1.4M Customers)</title><link>https://breachnotes.vulnetix.com/cloud/2026-01_betterment-shinyhunters-vishing/</link><pubDate>Fri, 09 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-01_betterment-shinyhunters-vishing/</guid><description>On January 9, 2026, Betterment (a major US robo-advisor and investment platform) suffered a data breach after ShinyHunters used vishing to compromise IT support at a third-party vendor believed to be Salesforce, which Betterment uses for marketing and customer communications. After Betterment …</description><content:encoded>On January 9, 2026, Betterment (a major US robo-advisor and investment platform) suffered a data breach after ShinyHunters used vishing to compromise IT support at a third-party vendor believed to be Salesforce, which Betterment uses for marketing and customer communications. After Betterment declined to pay ransom, data was publicly dumped on January 23, 2026. Betterment confirmed exposure of personal information for approximately 1.4 million customers, though ShinyHunters claimed over 2 million records. Exposed data included names, email addresses, physical addresses, phone numbers, and birthdates. The leaked files also reportedly contained retirement plan details, financial interests, internal meeting notes, and pipeline data. Following the breach, fraudulent messages were sent to Betterment customers urging cryptocurrency transfers. The breach is part of ShinyHunters&amp;rsquo; broader Salesforce/Okta vishing campaign targeting dozens of financial and technology companies through 2025–2026.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.americanbanker.com/news/1-4-million-data-breach-betterment-shinyhunters-salesforce</breach:sourceUrl><breach:dateOfBreach>2026-01-09</breach:dateOfBreach><breach:dateOfDisclosure>2026-01-23</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2026-01-23</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters used vishing (voice phishing) to compromise IT support at a third-party vendor (believed to be Salesforce) used by Betterment for marketing and customer communications, gaining access to third-party software platforms</breach:initialAttackVector><breach:vendorProduct>Salesforce (third-party marketing/CRM platform)</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Telus Digital ShinyHunters Breach - ~1 Petabyte</title><link>https://breachnotes.vulnetix.com/cloud/2026-03_telus-digital-shinyhunters/</link><pubDate>Thu, 01 Jan 2026 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2026-03_telus-digital-shinyhunters/</guid><description>Telus Digital (Canadian BPO providing outsourced customer support, content moderation, and AI services) confirmed a multi-month breach on March 12, 2026. ShinyHunters claimed credit, alleging theft of nearly 1 petabyte of data. Attackers found GCP credentials in a Drift data export, used them to …</description><content:encoded>Telus Digital (Canadian BPO providing outsourced customer support, content moderation, and AI services) confirmed a multi-month breach on March 12, 2026. ShinyHunters claimed credit, alleging theft of nearly 1 petabyte of data. Attackers found GCP credentials in a Drift data export, used them to access BigQuery, then ran trufflehog to discover additional credentials enabling lateral movement. Stolen data allegedly included customer support records, agent performance data, AI training data, call recordings, FBI background checks, Salesforce data, source code, and financial information for numerous BPO client companies. ShinyHunters demanded $65 million and received no response. The breach is potentially related to simultaneous attacks on Crunchyroll and Hims &amp;amp; Hers, both Telus Digital BPO clients, via compromised Okta SSO accounts.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/</breach:sourceUrl><breach:dateOfBreach>2026-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-12</breach:dateOfDisclosure><breach:initialAttackVector>ShinyHunters discovered Google Cloud Platform credentials for Telus Digital embedded in a Drift data export; used those credentials to access BigQuery, then pivoted using additional secrets found with trufflehog to access further systems</breach:initialAttackVector><breach:vendorProduct>Google Cloud Platform (BigQuery); Salesforce; Drift</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Eurail B.V. AWS S3/Zendesk/GitLab Breach - 308K Travelers</title><link>https://breachnotes.vulnetix.com/cloud/2025-12_eurail-aws-s3-passport-breach/</link><pubDate>Fri, 26 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-12_eurail-aws-s3-passport-breach/</guid><description>On December 26, 2025, an unauthorized actor exfiltrated data from Eurail B.V.'s (European rail pass operator covering 33 national railways) AWS S3, Zendesk, and GitLab instances. Eurail identified the breach on February 25, 2026 and notified 308,777 affected individuals on March 27. Exposed data …</description><content:encoded>On December 26, 2025, an unauthorized actor exfiltrated data from Eurail B.V.&amp;rsquo;s (European rail pass operator covering 33 national railways) AWS S3, Zendesk, and GitLab instances. Eurail identified the breach on February 25, 2026 and notified 308,777 affected individuals on March 27. Exposed data included names and passport numbers for most customers; DiscoverEU program participants had additional data exposed including ages, passport photocopies, addresses, bank account numbers, and some health data. Eurail notified EU data protection authorities under GDPR and advised password resets and vigilance against phishing.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/eurail-says-december-data-breach-impacts-300-000-individuals/</breach:sourceUrl><breach:dateOfBreach>2025-12-26</breach:dateOfBreach><breach:dateOfDisclosure>2026-03-27</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2026-03-27</breach:dateOfCustomerNotification><breach:initialAttackVector>Unauthorized actor transferred files from Eurail's AWS S3 buckets, Zendesk instance, and GitLab repositories on December 26, 2025; initial access vector not disclosed</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services S3; Zendesk; GitLab</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>SoundCloud Data Breach - ShinyHunters Vishing (29.8M Accounts)</title><link>https://breachnotes.vulnetix.com/cloud/2025-12_soundcloud-shinyhunters-vishing/</link><pubDate>Mon, 15 Dec 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-12_soundcloud-shinyhunters-vishing/</guid><description>In December 2025, ShinyHunters breached SoundCloud via vishing — attackers convinced employees to provide access to an ancillary service dashboard. SoundCloud confirmed the breach on December 15, 2025. After the company declined to pay ransom, ShinyHunters began leaking data on January 22, 2026, via …</description><content:encoded>In December 2025, ShinyHunters breached SoundCloud via vishing — attackers convinced employees to provide access to an ancillary service dashboard. SoundCloud confirmed the breach on December 15, 2025. After the company declined to pay ransom, ShinyHunters began leaking data on January 22, 2026, via Telegram and .onion links. The breach affected approximately 29.8 million accounts, roughly 20% of SoundCloud&amp;rsquo;s user base. Exposed data included names, email addresses, usernames, avatars, follower/following counts, and select users&amp;rsquo; countries. Passwords, payment card numbers, and financial information were not accessed. Have I Been Pwned indexed the dataset. The breach is part of ShinyHunters&amp;rsquo; broader 2025–2026 campaign targeting companies via Salesforce/Okta vishing, alongside Qantas, Vietnam Airlines, CarGurus, Crunchbase, Betterment, and dozens of others.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.helpnetsecurity.com/2025/12/16/soundcloud-breach-dos-vpn/</breach:sourceUrl><breach:dateOfBreach>2025-12-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-12-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-12-15</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters used vishing (voice phishing) to trick SoundCloud employees into providing access credentials to an ancillary service dashboard rather than the company's core production systems</breach:initialAttackVector><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>IDMerit MongoDB KYC Data Exposure - 1 Billion Records</title><link>https://breachnotes.vulnetix.com/cloud/2025-11_idmerit-mongodb-kyc-exposure/</link><pubDate>Tue, 11 Nov 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-11_idmerit-mongodb-kyc-exposure/</guid><description>Cybernews researchers discovered on November 11, 2025, that IDMerit (a US identity verification and KYC/AML services provider) had left a MongoDB database publicly exposed without authentication. The database was secured November 12, 2025. Disclosure occurred February 18, 2026 (99 days after …</description><content:encoded>Cybernews researchers discovered on November 11, 2025, that IDMerit (a US identity verification and KYC/AML services provider) had left a MongoDB database publicly exposed without authentication. The database was secured November 12, 2025. Disclosure occurred February 18, 2026 (99 days after discovery). The exposed database contained approximately 1 billion personally identifiable records across 26 countries, including full names, addresses, national ID numbers, dates of birth, phone numbers, email addresses, telecom metadata, and KYC/AML verification logs. The US accounted for 203 million records, Mexico 124 million. No confirmed malicious access was reported, and no regulatory enforcement actions were announced as of February 2026.</content:encoded><category>cloud</category><breach:sourceUrl>https://cybernews.com/security/global-data-leak-exposes-billion-records/</breach:sourceUrl><breach:dateOfBreach>2025-11-11</breach:dateOfBreach><breach:dateOfDisclosure>2026-02-18</breach:dateOfDisclosure><breach:initialAttackVector>Misconfiguration: IDMerit left a MongoDB database containing KYC identity verification records publicly accessible on the internet without authentication</breach:initialAttackVector><breach:vendorProduct>MongoDB (cloud database)</breach:vendorProduct><breach:cloudProvider>MongoDB</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Mixpanel Product Analytics Platform Breach (Multiple Companies)</title><link>https://breachnotes.vulnetix.com/cloud/2025-11_mixpanel-analytics-multi-company/</link><pubDate>Wed, 15 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-11_mixpanel-analytics-multi-company/</guid><description>In late 2025, Mixpanel, a widely-used product analytics SaaS platform, suffered a breach that exposed user behavioral data from dozens of customer companies. Confirmed affected organizations include OpenAI, PornHub, Pinterest (Shuffles app), CoinDCX, SoundCloud, SwissBorg, and CoinLedger. Exposed …</description><content:encoded>In late 2025, Mixpanel, a widely-used product analytics SaaS platform, suffered a breach that exposed user behavioral data from dozens of customer companies. Confirmed affected organizations include OpenAI, PornHub, Pinterest (Shuffles app), CoinDCX, SoundCloud, SwissBorg, and CoinLedger. Exposed data categories varied by company but typically included user names, email addresses, device information, browser/OS metadata, geographic location data, and in some cases sensitive behavioral data such as video viewing histories, search terms, and financial transaction types. The breach highlighted the risk of sensitive behavioral and usage data flowing to third-party analytics vendors without adequate data minimization or contractual security controls. Multiple European DPAs opened investigations into the incident.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/mixpanel-data-breach-exposes-customer-data-from-dozens-of-companies/</breach:sourceUrl><breach:dateOfBreach>2025-10-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-11-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-11-10</breach:dateOfCustomerNotification><breach:initialAttackVector>Threat actors compromised Mixpanel's product analytics platform infrastructure, gaining access to customer behavioral and analytics data that dozens of companies had shared with Mixpanel for product improvement and user analytics purposes</breach:initialAttackVector><breach:vendorProduct>Mixpanel (product analytics SaaS)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Mixpanel</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Red Hat Consulting GitLab Breach - Crimson Collective (570GB, 800+ Enterprises)</title><link>https://breachnotes.vulnetix.com/cloud/2025-10_redhat-gitlab-crimson-collective/</link><pubDate>Wed, 01 Oct 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-10_redhat-gitlab-crimson-collective/</guid><description>On October 1, 2025, the cybercrime group Crimson Collective disclosed a breach of Red Hat's consulting GitLab instance, claiming to have exfiltrated 570 GB of data from over 28,000 repositories. Red Hat confirmed unauthorized access to a GitLab instance used for internal Red Hat Consulting …</description><content:encoded>On October 1, 2025, the cybercrime group Crimson Collective disclosed a breach of Red Hat&amp;rsquo;s consulting GitLab instance, claiming to have exfiltrated 570 GB of data from over 28,000 repositories. Red Hat confirmed unauthorized access to a GitLab instance used for internal Red Hat Consulting collaboration, immediately isolated the instance, and notified authorities. Stolen data reportedly includes Customer Engagement Reports (CERs) containing infrastructure configurations, network topologies, security assessments, vulnerability details, authentication tokens, API keys, database connection strings, CI/CD pipeline configurations, and VPN settings — for approximately 800 enterprise customer organizations. Affected organizations reportedly include Bank of America, Citi, JPMorgan Chase, HSBC, IBM, Cisco, Verizon, T-Mobile, AT&amp;amp;T, Boeing, NSA, U.S. Navy, Department of Energy, NIST, Mayo Clinic, and Kaiser Permanente. Nissan confirmed impact from the breach. FINRA issued a cybersecurity alert regarding the incident. The same Crimson Collective group was also responsible for the Brightspeed telecom breach (January 2026).</content:encoded><category>cloud</category><breach:sourceUrl>https://www.redhat.com/en/blog/security-update-incident-related-red-hat-consulting-gitlab-instance</breach:sourceUrl><breach:dateOfBreach>2025-10-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-10-02</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-10-10</breach:dateOfCustomerNotification><breach:initialAttackVector>Crimson Collective gained unauthorized access to Red Hat's internal consulting GitLab instance used for customer engagement collaboration, exfiltrating approximately 570GB of compressed data from over 28,000 repositories</breach:initialAttackVector><breach:vendorProduct>GitLab (self-hosted instance)</breach:vendorProduct><breach:softwarePackage>GitLab</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>GitLab</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Cloudflare Third-Party Breach (September 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-09_cloudflare-drift-salesloft/</link><pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-09_cloudflare-drift-salesloft/</guid><description>In 2025, Cloudflare experienced a data security incident via a third-party vendor relationship. The
compromised third-party vendor was Drift (Salesloft). Source reporting:
https://blog.cloudflare.com/response-to-salesloft-drift-incident/</description><content:encoded>In 2025, Cloudflare experienced a data security incident via a third-party vendor relationship. The
compromised third-party vendor was Drift (Salesloft). Source reporting:
&lt;a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/">https://blog.cloudflare.com/response-to-salesloft-drift-incident/&lt;/a></content:encoded><category>cloud</category><breach:sourceUrl>https://blog.cloudflare.com/response-to-salesloft-drift-incident/</breach:sourceUrl><breach:dateOfBreach>2025-09-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Drift (Salesloft)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Elasticsearch B.V. Third-Party Breach (September 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-09_elasticsearch-b-v-drift-salesloft/</link><pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-09_elasticsearch-b-v-drift-salesloft/</guid><description>In 2025, Elasticsearch B.V. experienced a data security incident via a third-party vendor relationship. The
compromised third-party vendor was Drift (Salesloft). Source reporting:
https://www.elastic.co/blog/elastic-update-salesloft-drift-security-incident</description><content:encoded>In 2025, Elasticsearch B.V. experienced a data security incident via a third-party vendor relationship. The
compromised third-party vendor was Drift (Salesloft). Source reporting:
&lt;a href="https://www.elastic.co/blog/elastic-update-salesloft-drift-security-incident">https://www.elastic.co/blog/elastic-update-salesloft-drift-security-incident&lt;/a></content:encoded><category>cloud</category><breach:sourceUrl>https://www.elastic.co/blog/elastic-update-salesloft-drift-security-incident</breach:sourceUrl><breach:dateOfBreach>2025-09-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Drift (Salesloft)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Fastly Third-Party Breach (September 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-09_fastly-drift-salesloft/</link><pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-09_fastly-drift-salesloft/</guid><description>In 2025, Fastly experienced a data security incident via a third-party vendor relationship. The compromised
third-party vendor was Drift (Salesloft). Source reporting: https://www.fastlystatus.com/incident/377884</description><content:encoded>In 2025, Fastly experienced a data security incident via a third-party vendor relationship. The compromised
third-party vendor was Drift (Salesloft). Source reporting: &lt;a href="https://www.fastlystatus.com/incident/377884">https://www.fastlystatus.com/incident/377884&lt;/a></content:encoded><category>cloud</category><breach:sourceUrl>https://www.fastlystatus.com/incident/377884</breach:sourceUrl><breach:dateOfBreach>2025-09-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Drift (Salesloft)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Workday Third-Party Breach (September 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-09_workday-drift-salesloft/</link><pubDate>Mon, 01 Sep 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-09_workday-drift-salesloft/</guid><description>In 2025, Workday experienced a data security incident via a third-party vendor relationship. The compromised
third-party vendor was Drift (Salesloft). Source reporting:
https://blog.workday.com/en-us/workdays-response-salesloft-drift-security-incident.html</description><content:encoded>In 2025, Workday experienced a data security incident via a third-party vendor relationship. The compromised
third-party vendor was Drift (Salesloft). Source reporting:
&lt;a href="https://blog.workday.com/en-us/workdays-response-salesloft-drift-security-incident.html">https://blog.workday.com/en-us/workdays-response-salesloft-drift-security-incident.html&lt;/a></content:encoded><category>cloud</category><breach:sourceUrl>https://blog.workday.com/en-us/workdays-response-salesloft-drift-security-incident.html</breach:sourceUrl><breach:dateOfBreach>2025-09-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Drift (Salesloft)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Salesloft Drift OAuth Token Supply Chain Attack</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_salesloft-drift-oauth-salesforce/</link><pubDate>Fri, 08 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_salesloft-drift-oauth-salesforce/</guid><description>Between August 8–18, 2025, threat actors tracked as UNC6395 exploited compromised OAuth tokens from the Salesloft Drift integration to gain unauthorized access to connected customer environments. More than 700 organizations were affected, including major technology and security vendors such as …</description><content:encoded>Between August 8–18, 2025, threat actors tracked as UNC6395 exploited compromised OAuth tokens from the Salesloft Drift integration to gain unauthorized access to connected customer environments. More than 700 organizations were affected, including major technology and security vendors such as Cloudflare, Zscaler, Palo Alto Networks, and PagerDuty. Stolen data varied by organization but commonly included business contact records (names, titles, emails, phone numbers), Salesforce CRM data (Accounts, Contacts, Opportunities, Cases), and in some cases API keys, Snowflake tokens, cloud credentials, and passwords embedded in support cases. Salesloft took Drift offline following the discovery. FINRA issued a cybersecurity alert. Organizations were advised to disconnect all Salesloft integrations and rotate exposed credentials.</content:encoded><category>cloud</category><breach:sourceUrl>https://thehackernews.com/2025/09/salesloft-takes-drift-offline-after.html</breach:sourceUrl><breach:dateOfBreach>2025-08-08</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-09-01</breach:dateOfCustomerNotification><breach:initialAttackVector>UNC6395 compromised Salesloft's Drift AI chatbot integration and stole OAuth authentication tokens used to connect Drift with downstream customer Salesforce, Google Workspace, and Slack environments</breach:initialAttackVector><breach:vendorProduct>Salesloft Drift (AI chat/sales engagement platform); Salesforce; Google Workspace; Slack</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Air France-KLM Group Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_air-france-klm-group-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_air-france-klm-group-salesforce/</guid><description>Air France and KLM disclose data breaches impacting customers. Air France and KLM announced on Wednesday that attackers had breached a customer service platform and stolen the data of an undisclosed number of customers. Together with Transavia, Air France and KLM are part of Air France–KLM Group, a …</description><content:encoded>Air France and KLM disclose data breaches impacting customers. Air France and KLM announced on Wednesday that attackers had breached a customer service platform and stolen the data of an undisclosed number of customers. Together with Transavia, Air France and KLM are part of Air France–KLM Group, a French-Dutch multinational airline holding company founded in 2004 and a major player in international air transport. With a fleet of 564 aircraft and 78,000 employees, Air France-KLM provides services to up to 300 destinations in 90 countries. In 2024, the aviation group transported 98 million passengers worldwide. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/air-france-and-klm-disclose-data-breaches-impacting-customers/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-07</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Chanel Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_chanel-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_chanel-salesforce/</guid><description>Fashion giant Chanel hit in wave of Salesforce data theft attacks. French fashion giant Chanel is the latest company to suffer a data breach in an ongoing wave of Salesforce data theft attacks. Chanel says the breach was first detected on July 25th after threat actors gained access to a Chanel …</description><content:encoded>Fashion giant Chanel hit in wave of Salesforce data theft attacks. French fashion giant Chanel is the latest company to suffer a data breach in an ongoing wave of Salesforce data theft attacks. Chanel says the breach was first detected on July 25th after threat actors gained access to a Chanel database hosted at a third-party service provider, as first reported by WWD. The breach only impacted customers in the United States and exposed personal contact information. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/fashion-giant-chanel-hit-in-wave-of-salesforce-data-theft-attacks/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-04</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Cisco Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_cisco-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_cisco-salesforce/</guid><description>Cisco discloses data breach impacting Cisco.com user accounts. Cisco has disclosed that cybercriminals stole the basic profile information of users registered on Cisco.com following a voice phishing (vishing) attack that targeted a company representative. After becoming aware of the incident on July …</description><content:encoded>Cisco discloses data breach impacting Cisco.com user accounts. Cisco has disclosed that cybercriminals stole the basic profile information of users registered on Cisco.com following a voice phishing (vishing) attack that targeted a company representative. After becoming aware of the incident on July 24th, the networking equipment giant discovered that the attacker tricked an employee and gained access to a third-party cloud-based Customer Relationship Management (CRM) system used by Cisco. This allowed the threat actor to steal the personal and user information of individuals with Cisco.com user accounts, including names, organization names, addresses, Cisco-assigned user IDs, email addresses, phone numbers, and account metadata such as creation dates. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-05</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Farmers Insurance Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_farmers-insurance-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_farmers-insurance-salesforce/</guid><description>Farmers Insurance data breach impacts 1.1M people after Salesforce attack. U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks. Farmers Insurance is a …</description><content:encoded>Farmers Insurance data breach impacts 1.1M people after Salesforce attack. U.S. insurance giant Farmers Insurance has disclosed a data breach impacting 1.1 million customers, with BleepingComputer learning that the data was stolen in the widespread Salesforce attacks. Farmers Insurance is a U.S.-based insurer that provides auto, home, life, and business insurance products. It operates through a network of agents and subsidiaries, serving more than 10 million households nationwide. The company disclosed the data breach in an advisory on its website, saying that its database at a third-party vendor was breached on May 29, 2025. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/farmers-insurance-data-breach-impacts-11m-people-after-salesforce-attack/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-25</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>PagerDuty Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_pagerduty-drift-salesloft/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_pagerduty-drift-salesloft/</guid><description>Update: Salesloft’s Drift Integration Security Incident Impacting Some PagerDuty Salesforce Data. Per our August 29 post, we were notified in late August that PagerDuty (and our customers) were affected by the Salesloft-Drift breach. We shared what we. Learn how strategic technology investments …</description><content:encoded>Update: Salesloft’s Drift Integration Security Incident Impacting Some PagerDuty Salesforce Data. Per our August 29 post, we were notified in late August that PagerDuty (and our customers) were affected by the Salesloft-Drift breach. We shared what we. Learn how strategic technology investments powered FOX&amp;rsquo;s digital and operational transformation. We&amp;rsquo;re empowering teams with the time and efficiency to build the future. Third-party company: Drift (Salesloft).</content:encoded><category>cloud</category><breach:sourceUrl>https://www.pagerduty.com/blog/news-announcements/salesloft-drift-data-breach-update-to-our-customers/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-04</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Drift (Salesloft)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Pandora Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_pandora-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_pandora-salesforce/</guid><description>Pandora confirms data breach amid ongoing Salesforce data theft attacks. Danish jewelry giant Pandora has disclosed a data breach after its customer information was stolen in the ongoing Salesforce data theft attacks. Pandora is one of the largest jewellery brands in the world, with 2,700 locations …</description><content:encoded>Pandora confirms data breach amid ongoing Salesforce data theft attacks. Danish jewelry giant Pandora has disclosed a data breach after its customer information was stolen in the ongoing Salesforce data theft attacks. Pandora is one of the largest jewellery brands in the world, with 2,700 locations and over 37,000 employees. &amp;ldquo;We are writing to inform you that your contact information was accessed by an unauthorized party through a third-party platform we use,&amp;rdquo; reads a Pandora data breach notification sent to customers. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/pandora-confirms-data-breach-amid-ongoing-salesforce-data-theft-attacks/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-05</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>TransUnion Third-Party Breach (August 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_transunion-salesforce/</link><pubDate>Fri, 01 Aug 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_transunion-salesforce/</guid><description>TransUnion suffers data breach impacting over 4.4 million people. Consumer credit reporting giant TransUnion warns it suffered a data breach exposing the personal information of over 4.4 million people in the United States, with BleepingComputer learning the data was stolen from it's Salesforce …</description><content:encoded>TransUnion suffers data breach impacting over 4.4 million people. Consumer credit reporting giant TransUnion warns it suffered a data breach exposing the personal information of over 4.4 million people in the United States, with BleepingComputer learning the data was stolen from it&amp;rsquo;s Salesforce account. Update: Story updated with confirmation that this was another Salesforce data theft attack and the types of data stolen. TransUnion is one of the three major credit bureaus in the United States, alongside Equifax and Experian. It operates in 30 countries, employs 13,000 staff, and has an annual revenue of $3 billion. Third-party company: Salesforce.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/transunion-suffers-data-breach-impacting-over-44-million-people/</breach:sourceUrl><breach:dateOfBreach>2025-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-28</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Allianz Life Insurance Data Breach (ShinyHunters/Scattered Spider)</title><link>https://breachnotes.vulnetix.com/cloud/2025-07_allianz-life-shiny-hunters/</link><pubDate>Wed, 16 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-07_allianz-life-shiny-hunters/</guid><description>On July 16, 2025, threat actors gained access to a third-party cloud CRM (Salesforce) used by Allianz Life Insurance of North America via social engineering/vishing. Attackers used Salesforce Data Loader to bulk-exfiltrate approximately 2.8 million records. Allianz Life has ~1.4 million customers; …</description><content:encoded>On July 16, 2025, threat actors gained access to a third-party cloud CRM (Salesforce) used by Allianz Life Insurance of North America via social engineering/vishing. Attackers used Salesforce Data Loader to bulk-exfiltrate approximately 2.8 million records. Allianz Life has ~1.4 million customers; the breach is reported to have affected the majority of them. Have I Been Pwned listed 1.1 million affected accounts. Stolen data includes names, addresses, phone numbers, birth dates, Tax IDs, insurance licence details, and firm affiliations. Attack attributed to a ShinyHunters/ScatteredLapsuSp1d3rHunters Telegram channel (alliance of ShinyHunters, Scattered Spider, Lapsus$). Part of a broader insurance industry targeting campaign in 2025.</content:encoded><category>cloud</category><breach:sourceUrl>https://therecord.media/allianz-life-social-engineering-data-breach</breach:sourceUrl><breach:dateOfBreach>2025-07-16</breach:dateOfBreach><breach:dateOfDisclosure>2025-07-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-08-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Vishing / social engineering: attackers impersonated IT helpdesk to trick an employee or vendor into granting access to a cloud-based Salesforce CRM system; Salesforce Data Loader used to bulk-exfiltrate data</breach:initialAttackVector><breach:vendorProduct>Salesforce CRM</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Cisco Salesforce ShinyHunters Breach</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_cisco-salesforce-shinyhunters/</link><pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_cisco-salesforce-shinyhunters/</guid><description>Cisco confirmed in August 2025 that it had been affected by the ShinyHunters Salesforce social engineering campaign. Exposed data included names, addresses, user IDs, email addresses, phone numbers, and account metadata for Cisco customers and partners. This is a separate incident from the April …</description><content:encoded>Cisco confirmed in August 2025 that it had been affected by the ShinyHunters Salesforce social engineering campaign. Exposed data included names, addresses, user IDs, email addresses, phone numbers, and account metadata for Cisco customers and partners. This is a separate incident from the April 2026 TeamPCP/Trivy supply chain attack that targeted Cisco&amp;rsquo;s developer environment. Part of the broader 2025 Salesforce campaign affecting TransUnion (44M+), Air France-KLM, Pandora, Chanel, Stellantis, and Farmers Insurance.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/cisco-confirms-salesforce-data-breach-via-shinyhunters-campaign/</breach:sourceUrl><breach:dateOfBreach>2025-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-08-20</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters compromised Cisco's Salesforce CRM environment through social engineering / vishing of a Salesforce-privileged employee, part of the broader 2025 ShinyHunters Salesforce campaign</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Pandora and Chanel Salesforce ShinyHunters Breach</title><link>https://breachnotes.vulnetix.com/cloud/2025-08_pandora-chanel-salesforce-shinyhunters/</link><pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-08_pandora-chanel-salesforce-shinyhunters/</guid><description>Pandora (Danish jewelry brand) and Chanel (French luxury fashion house) both disclosed in August 2025 that their Salesforce CRM environments had been compromised as part of the ShinyHunters/Scattered Spider Salesforce campaign. Pandora exposure included names, birthdates, and email addresses. Chanel …</description><content:encoded>Pandora (Danish jewelry brand) and Chanel (French luxury fashion house) both disclosed in August 2025 that their Salesforce CRM environments had been compromised as part of the ShinyHunters/Scattered Spider Salesforce campaign. Pandora exposure included names, birthdates, and email addresses. Chanel exposure included customer names, email addresses, mailing addresses, and phone numbers. Both companies notified affected customers and relevant European data protection authorities (DPA). Part of the broader 2025 Salesforce campaign affecting TransUnion (44M+), Air France-KLM, Cisco, Stellantis, and Farmers Insurance.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/pandora-chanel-among-luxury-brands-hit-by-salesforce-shinyhunters-breach/</breach:sourceUrl><breach:dateOfBreach>2025-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-08-20</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters compromised Pandora and Chanel's Salesforce CRM environments through social engineering / vishing, part of the broader 2025 ShinyHunters Salesforce campaign targeting major brand CRM instances</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Qantas Salesforce Breach via ShinyHunters Vishing - 5.7M Customers</title><link>https://breachnotes.vulnetix.com/cloud/2025-07_qantas-salesforce-shinyhunters-vishing/</link><pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-07_qantas-salesforce-shinyhunters-vishing/</guid><description>In July 2025, Qantas Airways (Australia's flag carrier) suffered a Salesforce data breach attributed to ShinyHunters/Scattered Lapsus$ Hunters via a vishing campaign. Approximately 5.7 million customer records were exfiltrated. Exposed data included customer names, email addresses, phone numbers, …</description><content:encoded>In July 2025, Qantas Airways (Australia&amp;rsquo;s flag carrier) suffered a Salesforce data breach attributed to ShinyHunters/Scattered Lapsus$ Hunters via a vishing campaign. Approximately 5.7 million customer records were exfiltrated. Exposed data included customer names, email addresses, phone numbers, frequent flyer program details, and for a subset: home/business addresses, dates of birth, gender preferences, and meal selections. Credit card details, financial information, and passport data were not compromised. This attack is part of a broader ShinyHunters Salesforce vishing campaign that started around June 2025 and affected at least 91 organizations worldwide, including Allianz Life, LVMH, Adidas, Cartier, Air France-KLM, Cisco, and others (see 2025-07_allianz-life-shiny-hunters.yaml).</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/shinyhunters-behind-salesforce-data-theft-attacks-at-qantas-allianz-life-and-lvmh/</breach:sourceUrl><breach:dateOfBreach>2025-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-08-01</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters (Scattered Lapsus$ Hunters) used vishing (voice phishing) to impersonate IT support staff, tricking employees into visiting Salesforce's connected app setup page and entering a 'connection code' that linked a malicious OAuth app (malicious Salesforce Data Loader) to the employee's Salesforce environment</breach:initialAttackVector><breach:vendorProduct>Salesforce CRM; Salesforce Data Loader (malicious OAuth app abuse)</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Stellantis Salesforce ShinyHunters Vishing Breach</title><link>https://breachnotes.vulnetix.com/cloud/2025-09_stellantis-salesforce-shinyhunters/</link><pubDate>Tue, 01 Jul 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-09_stellantis-salesforce-shinyhunters/</guid><description>Stellantis, the multinational automotive manufacturer (maker of Jeep, Chrysler, Fiat, Peugeot, and other brands), disclosed in September 2025 that a breach via its Salesforce platform had exposed customer contact information. The breach was attributed to the ShinyHunters/Scattered Spider social …</description><content:encoded>Stellantis, the multinational automotive manufacturer (maker of Jeep, Chrysler, Fiat, Peugeot, and other brands), disclosed in September 2025 that a breach via its Salesforce platform had exposed customer contact information. The breach was attributed to the ShinyHunters/Scattered Spider social engineering campaign that compromised Salesforce environments at multiple large enterprises in 2025. Exposed data included customer names, email addresses, and other contact information. Part of the broader 2025 Salesforce campaign that also affected TransUnion (44M+), Air France-KLM, Cisco, Pandora, Chanel, and Farmers Insurance.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/stellantis-discloses-data-breach-via-salesforce-platform/</breach:sourceUrl><breach:dateOfBreach>2025-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-09-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-09-20</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters compromised Stellantis's Salesforce environment through vishing/social engineering of a Salesforce-privileged user, part of the broader 2025 ShinyHunters Salesforce campaign</breach:initialAttackVector><breach:vendorProduct>Salesforce</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Farmers Insurance Data Breach via ShinyHunters / Salesforce Third-Party (1.07M)</title><link>https://breachnotes.vulnetix.com/cloud/2025-05_farmers-insurance-salesforce-shinyhunters/</link><pubDate>Thu, 29 May 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-05_farmers-insurance-salesforce-shinyhunters/</guid><description>On May 29, 2025, hackers breached a third-party vendor system used by Farmers Insurance Exchange and its subsidiaries. Farmers was alerted to the suspicious activity on May 30, 2025. Although Farmers did not publicly name the vendor, DataBreaches.net confirmed the breach was part of the broader …</description><content:encoded>On May 29, 2025, hackers breached a third-party vendor system used by Farmers Insurance Exchange and its subsidiaries. Farmers was alerted to the suspicious activity on May 30, 2025. Although Farmers did not publicly name the vendor, DataBreaches.net confirmed the breach was part of the broader ShinyHunters/Scattered Spider campaign targeting Salesforce environments. Written notifications were sent to approximately 1,071,172 affected individuals on August 22, 2025. Compromised data includes names, addresses, dates of birth, driver&amp;rsquo;s license numbers, and the last four digits of Social Security numbers. Farmers Insurance Exchange, Farmers Group Inc., and their subsidiaries were all affected. Affected individuals were offered 24 months of free identity monitoring through Sontiq/CyberScout. The breach is part of ShinyHunters&amp;rsquo; broader 2025 campaign targeting dozens of enterprises through Salesforce/Okta vishing.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/farmers-insurance-reports-data-breach-affecting-1-million-customers/</breach:sourceUrl><breach:dateOfBreach>2025-05-29</breach:dateOfBreach><breach:dateOfDisclosure>2025-08-22</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-08-22</breach:dateOfCustomerNotification><breach:initialAttackVector>ShinyHunters and Scattered Spider breached a third-party vendor (believed to be Salesforce) used by Farmers Insurance, gaining unauthorized access to a database containing customer information</breach:initialAttackVector><breach:vendorProduct>Salesforce (third-party vendor)</breach:vendorProduct><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>BleepingComputer</title><link>https://breachnotes.vulnetix.com/cloud/2025-05_dragonforce-simplehelp-msp/</link><pubDate>Thu, 01 May 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-05_dragonforce-simplehelp-msp/</guid><description>The DragonForce ransomware cartel exploited three vulnerabilities in SimpleHelp RMM software (disclosed January 2025) to breach a managed service provider (MSP) and then pivot to the MSP's downstream customers. CVE-2024-57727 (CVSS 7.5) is a path traversal flaw; CVE-2024-57726 (CVSS 9.9) allows …</description><content:encoded>The DragonForce ransomware cartel exploited three vulnerabilities in SimpleHelp RMM software (disclosed January 2025) to breach a managed service provider (MSP) and then pivot to the MSP&amp;rsquo;s downstream customers. CVE-2024-57727 (CVSS 7.5) is a path traversal flaw; CVE-2024-57726 (CVSS 9.9) allows privilege escalation; CVE-2024-57728 allows arbitrary file upload as admin. Attackers used the MSP&amp;rsquo;s legitimate SimpleHelp infrastructure to deliver a modified installer to client endpoints, enabling credential harvesting and ransomware deployment. Multiple downstream clients suffered data theft and encryption in a classic MSP supply chain attack. Research published by Sophos. DragonForce offers affiliates an 80/20 revenue split and has become a dominant ransomware cartel after absorbing talent from disrupted groups.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/</breach:sourceUrl><breach:dateOfBreach>2025-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-05-28</breach:dateOfDisclosure><breach:dateOfCustomerNotification>unknown</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-22: Path Traversal (CVE-2024-57727) and CWE-269: Improper Privilege Management (CVE-2024-57726)</breach:initialAttackVector><breach:cve>CVE-2024-57726</breach:cve><breach:cve>CVE-2024-57727</breach:cve><breach:cve>CVE-2024-57728</breach:cve><breach:vendorProduct>SimpleHelp RMM (Remote Monitoring and Management)</breach:vendorProduct><breach:softwarePackage>SimpleHelp</breach:softwarePackage><breach:malware>DragonForce ransomware</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>SimpleHelp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Ivanti Connect Secure zero-day exploitation CVE-2025-22457 (UNC5221 / China-nexus)</title><link>https://breachnotes.vulnetix.com/cloud/2025-04_ivanti-connect-secure-cve-2025-22457/</link><pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-04_ivanti-connect-secure-cve-2025-22457/</guid><description>CVE-2025-22457 is a stack-based buffer overflow in Ivanti Connect Secure. Ivanti initially classified it as a low-risk DoS-only vulnerability and patched it 11 February 2025 in version 22.7R2.6. Chinese APT group UNC5221 reverse-engineered the patch, determined RCE was achievable on 22.7R2.5 and …</description><content:encoded>CVE-2025-22457 is a stack-based buffer overflow in Ivanti Connect Secure. Ivanti initially classified it as a low-risk DoS-only vulnerability and patched it 11 February 2025 in version 22.7R2.6. Chinese APT group UNC5221 reverse-engineered the patch, determined RCE was achievable on 22.7R2.5 and earlier, and began active exploitation in mid-March 2025. Mandiant and Google GTIG confirmed exploitation and attributed to UNC5221 (suspected Chinese espionage). Malware deployed: TRAILBLAZE in-memory dropper, BRUSHFIRE passive backdoor, and the SPAWN ecosystem of implants. Shadowserver found 5,113 vulnerable instances on 6 April 2025. CISA added to KEV catalog. Mandiant also identified zero-day exploitation of CVE-2025-0282 beginning mid-December 2024 (separate earlier campaign).</content:encoded><category>cloud</category><breach:sourceUrl>https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability</breach:sourceUrl><breach:dateOfBreach>2025-03-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-03</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-04-03</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-121: Stack-based Buffer Overflow (CVE-2025-22457 — stack buffer overflow in Ivanti Connect Secure enabling remote code execution)</breach:initialAttackVector><breach:cve>CVE-2025-22457</breach:cve><breach:vendorProduct>Ivanti Connect Secure VPN (versions 22.7R2.5 and earlier; ICS 9.x end-of-life)</breach:vendorProduct><breach:malware>TRAILBLAZE (in-memory dropper), BRUSHFIRE (passive backdoor), SPAWN ecosystem</breach:malware><breach:cloudProvider>Ivanti</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Multiple US healthcare organizations and hospitals Third-Party Breach (March 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-03_multiple-us-healthcare-organizations-and-hospitals-oracle-health-formerly-cerne/</link><pubDate>Sat, 01 Mar 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-03_multiple-us-healthcare-organizations-and-hospitals-oracle-health-formerly-cerne/</guid><description>Oracle Health breach compromises patient data at US hospitals. A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. Oracle Health has not yet publicly disclosed the incident, but in private communications …</description><content:encoded>Oracle Health breach compromises patient data at US hospitals. A breach at Oracle Health impacts multiple US healthcare organizations and hospitals after a threat actor stole patient data from legacy servers. Oracle Health has not yet publicly disclosed the incident, but in private communications sent to impacted customers and from conversations with those involved, BleepingComputer confirmed that patient data was stolen in the attack. Oracle Health, formerly known as Cerner, is a healthcare software-as-a-service (SaaS) company offering Electronic Health Records (EHR) and business operations systems to hospitals and healthcare organizations. After being acquired by Oracle in 2022, Cerner was merged into Oracle Health, with its systems migrated to Oracle Cloud. Third-party company: Oracle Health (formerly Cerner).</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/</breach:sourceUrl><breach:dateOfBreach>2025-03-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-28</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Oracle Health (formerly Cerner)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Oracle Cloud</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Western Sydney University data breach (2025) — 10,000 students</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_western-sydney-university/</link><pubDate>Tue, 28 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_western-sydney-university/</guid><description>Unauthorised access to Western Sydney University's systems via the SSO service occurred between 28 January and 25 February 2025. Approximately 10,000 current and former students notified 15 April 2025. Stolen data: names, dates of birth, email addresses, phone numbers, student admission and …</description><content:encoded>Unauthorised access to Western Sydney University&amp;rsquo;s systems via the SSO service occurred between 28 January and 25 February 2025. Approximately 10,000 current and former students notified 15 April 2025. Stolen data: names, dates of birth, email addresses, phone numbers, student admission and enrolment details, tax file numbers, passport numbers, driver&amp;rsquo;s licence details, and visa information. A former WSU student, Birdie Kingston (27), was arrested and charged with 20 offences including blackmail and accessing/modifying restricted data. This was WSU&amp;rsquo;s third breach in approximately one year. A second separate incident in June–September 2025 via a third-party cloud system exposed bank details and health records.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.westernsydney.edu.au/news/cyber-details/april-15-2025</breach:sourceUrl><breach:dateOfBreach>2025-01-28</breach:dateOfBreach><breach:dateOfDisclosure>2025-04-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-04-15</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-287: Improper Authentication (single sign-on (SSO) service compromised; insider/former student gained unauthorised access)</breach:initialAttackVector><breach:vendorProduct>Western Sydney University SSO / identity management systems</breach:vendorProduct><breach:cloudProvider>Microsoft</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Oracle Health (Cerner) Legacy Server Breach - 80 Hospitals Patient Data</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_oracle-health-cerner-hospitals/</link><pubDate>Wed, 22 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_oracle-health-cerner-hospitals/</guid><description>On or after January 22, 2025, a threat actor used stolen credentials to access legacy Cerner electronic health record (EHR) servers belonging to Oracle Health that had not yet been migrated to Oracle Cloud. Oracle Health (which acquired Cerner in 2022) detected the breach around February 20, 2025, …</description><content:encoded>On or after January 22, 2025, a threat actor used stolen credentials to access legacy Cerner electronic health record (EHR) servers belonging to Oracle Health that had not yet been migrated to Oracle Cloud. Oracle Health (which acquired Cerner in 2022) detected the breach around February 20, 2025, and BleepingComputer first publicly disclosed it on March 28, 2025. Up to 80 hospitals may have been affected, including facilities confirmed in Texas (4,082 individuals), Massachusetts (6,562), South Carolina (2,989), and Washington (802). AdventHealth was among the named health systems. Exposed patient data includes names, Social Security numbers, addresses, dates of birth, medical record numbers, details of care and treatment, diagnoses, physician names, medical images, medications, and test results. The FBI investigated potential extortion attempts related to the breach. CVE-2025-30154 (CVSS 8.6) was added to CISA&amp;rsquo;s Known Exploited Vulnerabilities catalog in connection with Oracle infrastructure exploitation during this period.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.hipaajournal.com/oracle-health-data-breach/</breach:sourceUrl><breach:dateOfBreach>2025-01-22</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-28</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-04-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker used stolen credentials to access legacy Cerner EHR servers that had not yet been migrated to Oracle Cloud; CVE-2025-30154 exploited in related Oracle infrastructure</breach:initialAttackVector><breach:cve>CVE-2025-30154</breach:cve><breach:vendorProduct>Oracle Health (formerly Cerner) EHR</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Oracle Cloud</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Grubhub Data Breach via Third-Party Contractor</title><link>https://breachnotes.vulnetix.com/cloud/2025-02_grubhub-third-party-vendor/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-02_grubhub-third-party-vendor/</guid><description>Grubhub detected unusual activity traced to a compromised third-party contractor account in early 2025. The contractor had access to internal systems used for customer care. Stolen data included names, email addresses, phone numbers, partial payment card details (card type and last 4 digits) for …</description><content:encoded>Grubhub detected unusual activity traced to a compromised third-party contractor account in early 2025. The contractor had access to internal systems used for customer care. Stolen data included names, email addresses, phone numbers, partial payment card details (card type and last 4 digits) for some campus diners, and hashed passwords from legacy systems. Full card numbers, SSNs, bank account details, and driver&amp;rsquo;s licence numbers were not accessed. Grubhub immediately terminated the contractor&amp;rsquo;s access and removed the provider. ShinyHunters claimed responsibility for the extortion attempt, reportedly demanding Bitcoin payment to avoid publishing older Salesforce records from a February 2025 breach and newer Zendesk data. Food delivery platform breach via third-party vendor; highlights risks of contractor access to customer support systems.</content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2025/02/04/grubhub-confirms-data-breach-affecting-customers-and-drivers/</breach:sourceUrl><breach:dateOfBreach>2025-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-04</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-02-04</breach:dateOfCustomerNotification><breach:initialAttackVector>Compromised credentials of a third-party service provider / contractor with access to Grubhub's internal systems</breach:initialAttackVector><breach:cloudProvider>Salesforce</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Oracle Cloud (OCI) Infrastructure Breach — 6 Million Records, Login Credentials</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_oracle-cloud-sso-breach/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_oracle-cloud-sso-breach/</guid><description>In March 2025, a threat actor known as 'rose87168' advertised on BreachForums the sale of approximately 6 million records allegedly stolen from Oracle Cloud's federated SSO login servers. The attacker posted sample data and offered to sell the database for $200 million, or exchange it for …</description><content:encoded><![CDATA[In March 2025, a threat actor known as &lsquo;rose87168&rsquo; advertised on BreachForums the sale of approximately 6 million records allegedly stolen from Oracle Cloud&rsquo;s federated SSO login servers. The attacker posted sample data and offered to sell the database for $200 million, or exchange it for information on decrypting the hashed passwords. Oracle initially denied the breach occurred, stating &lsquo;Oracle Cloud has not experienced a security breach.&rsquo; However, multiple security researchers verified that the sample data appeared authentic, matching real Oracle Cloud customer domains and encrypted credentials. The attacker provided evidence including creating a specific file on an Oracle server and sharing a 2024-era archive.org URL of the targeted oracle.com subdomain (login.us2.oraclecloud.com) running an allegedly vulnerable version. The breach appeared to leverage CVE-2021-35587 — an Oracle Fusion Middleware Access Manager vulnerability — against a server that had not been patched. Oracle privately notified some customers of the breach despite public denial. The stolen data included Java KeyStore (JKS) files, encrypted SSO passwords, and LDAP hashes for Oracle Cloud customers. Multiple cybersecurity companies including CrowdStrike and CloudSEK confirmed elements of the breach. Oracle&rsquo;s continued public denial while privately notifying customers drew significant criticism. The incident was investigated by the FBI and CISA.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/oracle-denies-breach-after-hacker-claims-theft-of-6-million-data-records/</breach:sourceUrl><breach:dateOfBreach>2025-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-03-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-03-31</breach:dateOfCustomerNotification><breach:initialAttackVector>A threat actor known as 'rose87168' claimed to have exploited a vulnerability in Oracle Cloud's login infrastructure (login.oracle.com / Oracle Identity Manager) to access Oracle's SSO and LDAP systems, exfiltrating approximately 6 million records including encrypted SSO passwords, LDAP password hashes, and JKS files</breach:initialAttackVector><breach:cve>CVE-2021-35587</breach:cve><breach:vendorProduct>Oracle Cloud Infrastructure (OCI) / Oracle Identity Manager / Oracle Access Manager</breach:vendorProduct><breach:cloudProvider>Oracle Cloud</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Wyndham Third-Party Breach (January 2025)</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_wyndham-otelier/</link><pubDate>Wed, 01 Jan 2025 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_wyndham-otelier/</guid><description>Otelier data breach exposes info, hotel reservations of millions. Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests' personal information and reservations for well-known hotel brands like Marriott, Hilton, …</description><content:encoded>Otelier data breach exposes info, hotel reservations of millions. Hotel management platform Otelier suffered a data breach after threat actors breached its Amazon S3 cloud storage to steal millions of guests&amp;rsquo; personal information and reservations for well-known hotel brands like Marriott, Hilton, and Hyatt. The breach first allegedly occurred in July 2024, with continued access through October, with the threat actors claiming to have stolen amost eight terabytes of data from Otelier&amp;rsquo;s Amazon AWS S3 buckets. In a statement to BleepingComputer, Otelier confirmed the compromise and said it is communicating with impacted customers. Third-party company: Otelier.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-hotel-reservations-of-millions/</breach:sourceUrl><breach:dateOfBreach>2025-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-17</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Otelier</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Ivanti Connect Secure zero-day CVE-2025-0282 exploited by UNC5221 (China-nexus)</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_ivanti-connect-secure-cve-2025-0282/</link><pubDate>Sun, 15 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_ivanti-connect-secure-cve-2025-0282/</guid><description>CVE-2025-0282 is an unauthenticated stack-based buffer overflow in Ivanti Connect Secure, Policy Secure, and ZTA Gateways enabling remote code execution. Mandiant identified zero-day exploitation beginning mid-December 2024 by UNC5221/UNC5337 (China-nexus espionage). Ivanti disclosed 8 January 2025 …</description><content:encoded>CVE-2025-0282 is an unauthenticated stack-based buffer overflow in Ivanti Connect Secure, Policy Secure, and ZTA Gateways enabling remote code execution. Mandiant identified zero-day exploitation beginning mid-December 2024 by UNC5221/UNC5337 (China-nexus espionage). Ivanti disclosed 8 January 2025 with a patch. Post-exploitation chain: disable SELinux, prevent syslog forwarding, remount filesystem read-write, drop webshells, remove log evidence, deploy SPAWN malware ecosystem. 33,000+ exposed ICS instances globally at time of disclosure. CISA added to KEV catalog. Predecessor campaigns by UNC5221 also exploited CVE-2023-46805 and CVE-2024-21887 in December 2023.</content:encoded><category>cloud</category><breach:sourceUrl>https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day</breach:sourceUrl><breach:dateOfBreach>2024-12-15</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-08</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-01-08</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-121: Stack-based Buffer Overflow (CVE-2025-0282 — unauthenticated stack-based buffer overflow enabling RCE)</breach:initialAttackVector><breach:cve>CVE-2025-0282</breach:cve><breach:cve>CVE-2025-0283</breach:cve><breach:vendorProduct>Ivanti Connect Secure VPN / Ivanti Policy Secure / Ivanti ZTA Gateways</breach:vendorProduct><breach:malware>SPAWN ecosystem (SPAWNANT installer, SPAWNMOLE tunneller, SPAWNSNAIL SSH backdoor, SPAWNSLOTH log tamper tool)</breach:malware><breach:cloudProvider>Ivanti</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Orange Romania HellCat/Rey Data Breach - 600K Records</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_orange-romania-hellcat-jira/</link><pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_orange-romania-hellcat-jira/</guid><description>In early 2025, the HellCat-affiliated threat actor 'Rey' exfiltrated 6.5 GB of data (12,000 files) from Orange Romania's back-office systems, resulting in exposure of over 600,000 records including approximately 380,000 unique email addresses, source code, invoices, contracts, customer data, and …</description><content:encoded>In early 2025, the HellCat-affiliated threat actor &amp;lsquo;Rey&amp;rsquo; exfiltrated 6.5 GB of data (12,000 files) from Orange Romania&amp;rsquo;s back-office systems, resulting in exposure of over 600,000 records including approximately 380,000 unique email addresses, source code, invoices, contracts, customer data, and partial payment card details. Rey claimed the breach stemmed from compromised credentials and Jira vulnerabilities and maintained access for over a month. After Orange declined ransom negotiations, Rey leaked the data on BreachForums. Orange characterized the breach as affecting a non-critical system with no impact on customer operations. Have I Been Pwned indexed the breach.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/</breach:sourceUrl><breach:dateOfBreach>2024-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-02-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-02-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Compromised credentials and vulnerabilities in Orange Romania's Jira software and internal portals; attacker had access for over one month</breach:initialAttackVector><breach:vendorProduct>Atlassian Jira (project management platform)</breach:vendorProduct><breach:cloudProvider>Atlassian</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Schneider Electric Third-Party Breach (November 2024)</title><link>https://breachnotes.vulnetix.com/cloud/2024-11_schneider-electric-atlassian-s-jira-server/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-11_schneider-electric-atlassian-s-jira-server/</guid><description>Schneider Electric confirms dev platform breach after hacker steals data. Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company's JIRA server. "Schneider Electric is investigating a cybersecurity incident involving …</description><content:encoded><![CDATA[Schneider Electric confirms dev platform breach after hacker steals data. Schneider Electric has confirmed a developer platform was breached after a threat actor claimed to steal 40GB of data from the company&rsquo;s JIRA server. &ldquo;Schneider Electric is investigating a cybersecurity incident involving unauthorized access to one of our internal project execution tracking platforms which is hosted within an isolated environment,&rdquo; Schneider Electric told BleepingComputer. &ldquo;Our Global Incident Response team has been immediately mobilized to respond to the incident. Schneider Electric&rsquo;s products and services remain unaffected.&rdquo;. Third-party company: Atlassian&rsquo;s JIRA server.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/schneider-electric-confirms-dev-platform-breach-after-hacker-steals-data/</breach:sourceUrl><breach:dateOfBreach>2024-11-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-11-04</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Atlassian's JIRA server</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Atlassian</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Serviceaide Unsecured Elasticsearch Database - 483K Catholic Health Patients</title><link>https://breachnotes.vulnetix.com/cloud/2024-09_serviceaide-catholic-health-elasticsearch/</link><pubDate>Thu, 19 Sep 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-09_serviceaide-catholic-health-elasticsearch/</guid><description>Between September 19 and November 5, 2024, Serviceaide (an agentic AI-powered IT and workflow management platform based in Santa Clara, CA) left an Elasticsearch database containing Catholic Health patient records publicly accessible without authentication. Serviceaide discovered the exposure on …</description><content:encoded>Between September 19 and November 5, 2024, Serviceaide (an agentic AI-powered IT and workflow management platform based in Santa Clara, CA) left an Elasticsearch database containing Catholic Health patient records publicly accessible without authentication. Serviceaide discovered the exposure on November 15, 2024, but did not notify the HHS Office for Civil Rights until May 9, 2025 — approximately 175 days after discovery. Approximately 483,000 patients of Catholic Health (a six-hospital healthcare system in Buffalo, New York) were affected. Exposed data includes names, dates of birth, Social Security numbers, medical and health information, treatment details, health insurance information, and email addresses/usernames. Six class action lawsuits were filed in federal court in California on May 19, 2025.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.hipaajournal.com/serviceaide-data-breach/</breach:sourceUrl><breach:dateOfBreach>2024-09-19</breach:dateOfBreach><breach:dateOfDisclosure>2025-05-09</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-05-09</breach:dateOfCustomerNotification><breach:initialAttackVector>Misconfiguration: Serviceaide left an Elasticsearch database containing Catholic Health patient PHI publicly accessible on the internet without authentication for approximately six weeks</breach:initialAttackVector><breach:vendorProduct>Elasticsearch (cloud database)</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>AT&amp;T Third-Party Breach (July 2024)</title><link>https://breachnotes.vulnetix.com/cloud/2024-07_at-t-snowflake/</link><pubDate>Mon, 01 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-07_at-t-snowflake/</guid><description>Massive AT&amp;T data breach exposes call logs of 109 million customers. AT&amp;T is warning of a massive data breach where threat actors stole the call logs for approximately 109 million customers, or nearly all of its mobile customers, from an online database on the company's Snowflake account. The …</description><content:encoded><![CDATA[Massive AT&amp;T data breach exposes call logs of 109 million customers. AT&amp;T is warning of a massive data breach where threat actors stole the call logs for approximately 109 million customers, or nearly all of its mobile customers, from an online database on the company&rsquo;s Snowflake account. The company confirmed to BleepingComputer that the data was stolen from the Snowflake account between April 14 and April 25, 2024. In a Friday morning Form 8-K filling with the SEC, AT&amp;T says that the stolen data contains the call and text records of nearly all AT&amp;T mobile clients and customers of mobile virtual network operators (MVNOs) made from May 1 to October 31, 2022 and on January 2, 2023. Third-party company: Snowflake.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/massive-atandt-data-breach-exposes-call-logs-of-109-million-customers/</breach:sourceUrl><breach:dateOfBreach>2024-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-12</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Snowflake</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Otelier Hotel Management Platform Breach (Marriott, Hilton, Hyatt, Wyndham)</title><link>https://breachnotes.vulnetix.com/cloud/2025-01_otelier-hotel-reservation-platform/</link><pubDate>Mon, 01 Jul 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2025-01_otelier-hotel-reservation-platform/</guid><description>Otelier, a cloud-based hotel management platform used by major hotel chains worldwide, was breached starting in approximately July 2024. Threat actors obtained employee credentials — believed to have been stolen via infostealer malware — and used them to access Otelier's internal Atlassian tools and …</description><content:encoded>Otelier, a cloud-based hotel management platform used by major hotel chains worldwide, was breached starting in approximately July 2024. Threat actors obtained employee credentials — believed to have been stolen via infostealer malware — and used them to access Otelier&amp;rsquo;s internal Atlassian tools and AWS S3 data storage containing customer reservation records. The breach affected guests at Marriott, Hilton, Hyatt, and Wyndham properties that used Otelier for reservation management. Exposed data included guest names, email addresses, home addresses, reservation dates, transaction information, and PII. Otelier notified affected hotel brands in late 2024/early 2025. This incident highlighted the vulnerability of the hospitality sector&amp;rsquo;s shared SaaS infrastructure, where a single vendor breach can cascade to hundreds of major hotel properties and millions of guests across multiple competing brands.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/otelier-data-breach-exposes-info-of-guests-from-marriott-hilton-hyatt-and-wyndham/</breach:sourceUrl><breach:dateOfBreach>2024-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2025-01-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-01-10</breach:dateOfCustomerNotification><breach:initialAttackVector>Threat actors compromised Otelier's hotel management SaaS platform by stealing credentials through an infostealer malware infection, then used those credentials to access Otelier's Atlassian systems and AWS S3 buckets containing hotel customer reservation data</breach:initialAttackVector><breach:vendorProduct>Otelier (formerly Hotel Effectiveness)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Polyfill.io JavaScript Supply Chain Attack — 380,000 Websites Compromised</title><link>https://breachnotes.vulnetix.com/cloud/2024-06_polyfill-io-cdn-attack/</link><pubDate>Tue, 25 Jun 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-06_polyfill-io-cdn-attack/</guid><description>In June 2024, security researchers at Sansec discovered that cdn.polyfill.io — a widely used JavaScript polyfill service loaded by approximately 380,000 websites — had been modified to serve malicious code. Polyfill.io was a service providing JavaScript 'polyfills' that allow older browsers to …</description><content:encoded>In June 2024, security researchers at Sansec discovered that cdn.polyfill.io — a widely used JavaScript polyfill service loaded by approximately 380,000 websites — had been modified to serve malicious code. Polyfill.io was a service providing JavaScript &amp;lsquo;polyfills&amp;rsquo; that allow older browsers to support modern web features. The original maintainer sold the domain and GitHub repository to a company called Funnull CDN, associated with China, in February 2024. The new owners modified the polyfill.js script to inject malicious code that dynamically redirected mobile users to a fake sports betting site (a scam) and other malicious destinations, while avoiding detection by only activating on specific mobile browsers, avoiding users from security companies and high-traffic sites (Google Analytics detected users), and including anti-debugging code. High-profile websites affected included Hulu, JSTOR, Intuit, World Economic Forum, Mercedes-Benz, and hundreds of thousands of others. Cloudflare and Fastly immediately set up clean mirrors of the polyfill library. Google blocked ads for websites using the malicious polyfill CDN. The original Polyfill.io creator (Andrew Betts) had previously warned users not to use the service after he sold it and said it was unnecessary for modern browsers. Namecheap subsequently suspended the polyfill.io domain. The incident led to widespread calls to avoid loading third-party JavaScript from external CDNs and to self-host critical dependencies.</content:encoded><category>cloud</category><breach:sourceUrl>https://sansec.io/research/polyfill-supply-chain-attack</breach:sourceUrl><breach:dateOfBreach>2024-06-25</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-25</breach:dateOfDisclosure><breach:initialAttackVector>Chinese company Funnull CDN acquired the polyfill.io domain and associated GitHub repository from its original maintainer in early 2024; subsequently modified the polyfill.js script served by cdn.polyfill.io to inject malicious code that redirected mobile users to scam and malicious sites, with obfuscation to avoid detection</breach:initialAttackVector><breach:vendorProduct>cdn.polyfill.io (JavaScript polyfill CDN service)</breach:vendorProduct><breach:softwarePackage>polyfill.js</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Polyfill.io</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>404 Media</title><link>https://breachnotes.vulnetix.com/cloud/2024-07_snowflake-bausch-health-pharma/</link><pubDate>Wed, 01 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-07_snowflake-bausch-health-pharma/</guid><description>Bausch Health, a Canadian pharmaceutical company, was targeted as part of the 2024 UNC5537/Sp1d3rHunters Snowflake credential-theft campaign. The threat actor 'Sp1d3rHunters' claimed to have stolen approximately 3TB of data, including 1.6 million DEA numbers (Drug Enforcement Administration numbers …</description><content:encoded>Bausch Health, a Canadian pharmaceutical company, was targeted as part of the 2024 UNC5537/Sp1d3rHunters Snowflake credential-theft campaign. The threat actor &amp;lsquo;Sp1d3rHunters&amp;rsquo; claimed to have stolen approximately 3TB of data, including 1.6 million DEA numbers (Drug Enforcement Administration numbers assigned to healthcare providers to write prescriptions) and prescriber details. A $3 million ransom demand was issued. The exposure of DEA numbers is particularly severe because they cannot be easily reset — each provider must submit an individual request — creating long-term disruption risk for healthcare prescribers. This was part of the broader UNC5537 Snowflake campaign that targeted at least 160 organizations using stolen credentials obtained via infostealer malware, exploiting the absence of MFA.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.404media.co/hacker-breaches-pharma-giant-bausch-health-wants-to-extort-dea/</breach:sourceUrl><breach:dateOfBreach>2024-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-30</breach:dateOfDisclosure><breach:dateOfCustomerNotification>unknown</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-522: Insufficiently Protected Credentials (infostealer-harvested credentials, no MFA on Snowflake)</breach:initialAttackVector><breach:vendorProduct>Bausch Health Snowflake data warehouse</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Advance Auto Parts Third-Party Breach (May 2024)</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_advance-auto-parts-snowflake/</link><pubDate>Wed, 01 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_advance-auto-parts-snowflake/</guid><description>What Snowflake isn't saying about its customer data breaches | TechCrunch. As another Snowflake customer confirms a data breach, the cloud data company says its position "remains unchanged.". Snowflake’s security problems following a recent spate of customer data thefts are, for want of a better …</description><content:encoded>What Snowflake isn&amp;rsquo;t saying about its customer data breaches | TechCrunch. As another Snowflake customer confirms a data breach, the cloud data company says its position &amp;ldquo;remains unchanged.&amp;rdquo;. Snowflake’s security problems following a recent spate of customer data thefts are, for want of a better word, snowballing. Ticketmaster was the first company to link its recent data breach to the cloud data company Snowflake , and loan comparison site LendingTree has now confirmed its QuoteWizard subsidiary had data stolen from Snowflake. Third-party company: Snowflake.</content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2024/06/07/snowflake-ticketmaster-lendingtree-customer-data-breach/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAAp-QBodfvJGI6H699Rp2QNUDqHv0m0H9ixITAc8MaO4cxURq4B4FCPL8X8a8H4pX6Se11l244IWowOt3UqyHNb4M8tf7W2UkVSrGzeqKd_hy6cq8CN_TEsgq7mSaXaxzDFHqSjeVdxZM1_Yk3Bgfv8L1oNC1fu3yXBUvmLJk3CK</breach:sourceUrl><breach:dateOfBreach>2024-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-08</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Snowflake</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>BleepingComputer</title><link>https://breachnotes.vulnetix.com/cloud/2024-06_pure-storage-snowflake/</link><pubDate>Wed, 01 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-06_pure-storage-snowflake/</guid><description>Pure Storage, a leading enterprise cloud storage provider, confirmed on June 11, 2024 that attackers breached its Snowflake workspace as part of the broader UNC5537/Sp1d3r campaign targeting Snowflake customers lacking MFA. The compromised workspace contained telemetry data used for proactive …</description><content:encoded>Pure Storage, a leading enterprise cloud storage provider, confirmed on June 11, 2024 that attackers breached its Snowflake workspace as part of the broader UNC5537/Sp1d3r campaign targeting Snowflake customers lacking MFA. The compromised workspace contained telemetry data used for proactive customer support, including customer company names, LDAP usernames, email addresses, and Purity software release versions. No passwords, array credentials, or customer-stored data were compromised. Pure Storage stated there was no evidence of unauthorized access to customer storage systems. The breach was part of the same UNC5537 (ShinyHunters-affiliated) campaign that affected AT&amp;amp;T, Ticketmaster, Santander, and ~160 other organizations.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/pure-storage-confirms-data-breach-after-snowflake-account-hack/</breach:sourceUrl><breach:dateOfBreach>2024-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-11</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-522: Insufficiently Protected Credentials (infostealer-harvested credentials, no MFA on Snowflake)</breach:initialAttackVector><breach:vendorProduct>Pure Storage Snowflake workspace (telemetry/support)</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Ticketmaster Third-Party Breach (May 2024)</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_ticketmaster-snowflake/</link><pubDate>Wed, 01 May 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_ticketmaster-snowflake/</guid><description>Snowflake account hacks linked to Santander, Ticketmaster breaches. A threat actor claiming recent Santander and Ticketmaster breaches says they stole data after hacking into an employee's account at cloud storage company Snowflake. However, Snowflake disputes these claims, saying recent breaches …</description><content:encoded>Snowflake account hacks linked to Santander, Ticketmaster breaches. A threat actor claiming recent Santander and Ticketmaster breaches says they stole data after hacking into an employee&amp;rsquo;s account at cloud storage company Snowflake. However, Snowflake disputes these claims, saying recent breaches were caused by poorly secured customer accounts. Update 6/1/24: Hudson Rock has taken down their report that a hacker breached Snowflake to steal the data, shedding doubt on the hacker’s claims . BleepingComputer reached out to find out why, but the cybersecurity company has yet to reply. Our original report is below. Third-party company: Snowflake.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/snowflake-account-hacks-linked-to-santander-ticketmaster-breaches/#google_vignette</breach:sourceUrl><breach:dateOfBreach>2024-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-31</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Snowflake</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Dropbox Sign (HelloSign) Breach — Customer Data, API Keys, MFA, OAuth Tokens</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_dropbox-sign-mfa-seeds/</link><pubDate>Wed, 24 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_dropbox-sign-mfa-seeds/</guid><description>On 24 April 2024, Dropbox discovered that a threat actor had accessed Dropbox Sign's (formerly HelloSign's) production environment. Dropbox Sign is an e-signature service used by businesses and individuals to sign documents legally online. The attacker accessed the customer database containing all …</description><content:encoded>On 24 April 2024, Dropbox discovered that a threat actor had accessed Dropbox Sign&amp;rsquo;s (formerly HelloSign&amp;rsquo;s) production environment. Dropbox Sign is an e-signature service used by businesses and individuals to sign documents legally online. The attacker accessed the customer database containing all users of Dropbox Sign, as well as API customers (those who integrate Dropbox Sign via API). Exposed data for all Dropbox Sign customers included: email addresses, usernames, phone numbers, hashed passwords, general account settings, and authentication information (API keys, OAuth tokens, multi-factor authentication information including TOTP seeds). The exposure of MFA seeds was particularly serious — TOTP seeds allow an attacker to generate any current or future MFA code for affected accounts, effectively bypassing MFA. Dropbox reset all user passwords, MFA settings, and API keys globally for Dropbox Sign customers. Dropbox stated the breach was limited to Dropbox Sign&amp;rsquo;s infrastructure and that no Dropbox accounts, documents, or file data were accessed. Users who only used Dropbox Sign via a third-party integration had their third-party account data (not Dropbox data) exposed. The breach prompted concerns about document confidentiality for users of the e-signature platform, as signed documents in the system were not confirmed to be secure.</content:encoded><category>cloud</category><breach:sourceUrl>https://sign.dropbox.com/security-incident</breach:sourceUrl><breach:dateOfBreach>2024-04-24</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-05-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker gained access to a Dropbox Sign automated system configuration tool, using it to execute code in the context of the Sign application; this provided access to the customer database and to application-related secrets including API keys, OAuth tokens, and MFA keys/seeds</breach:initialAttackVector><breach:vendorProduct>Dropbox Sign (formerly HelloSign) e-signature platform</breach:vendorProduct><breach:cloudProvider>Dropbox</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Santander Bank data breach via Snowflake (UNC5537 / ShinyHunters)</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_santander-snowflake/</link><pubDate>Wed, 17 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_santander-snowflake/</guid><description>UNC5537 accessed a third-party Snowflake-hosted database used by Santander. Breach began April 17, discovered May 10, disclosed May 14. ShinyHunters listed data on BreachForums claiming 6 million account numbers, 28 million credit card numbers from Chile/Spain/Uruguay customers, plus all current and …</description><content:encoded>UNC5537 accessed a third-party Snowflake-hosted database used by Santander. Breach began April 17, discovered May 10, disclosed May 14. ShinyHunters listed data on BreachForums claiming 6 million account numbers, 28 million credit card numbers from Chile/Spain/Uruguay customers, plus all current and former staff globally. Maine AGO notified of 12,786 US employees&amp;rsquo; SSNs and payroll account numbers exposed. No transactional data or login credentials compromised. Part of the broader 165-organisation Snowflake campaign.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.securityweek.com/santander-employee-data-breach-linked-to-snowflake-attack/</breach:sourceUrl><breach:dateOfBreach>2024-04-17</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-14</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform / Santander third-party database</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Advance Auto Parts data breach via Snowflake (UNC5537)</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_advance-auto-parts-snowflake/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_advance-auto-parts-snowflake/</guid><description>UNC5537 accessed Advance Auto Parts' Snowflake environment between April 14 and May 24, 2024. Breach disclosed July 10 via Maine AGO notification affecting 2.3 million current and former employees and job applicants. Exposed data: names, SSNs, driver's licence numbers, dates of birth. $10 million …</description><content:encoded>UNC5537 accessed Advance Auto Parts&amp;rsquo; Snowflake environment between April 14 and May 24, 2024. Breach disclosed July 10 via Maine AGO notification affecting 2.3 million current and former employees and job applicants. Exposed data: names, SSNs, driver&amp;rsquo;s licence numbers, dates of birth. $10 million class action settlement reached. Part of the broader Snowflake campaign affecting 165+ organisations.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/advance-auto-parts-data-breach-impacts-23-million-people/</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-07-10</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform / Advance Auto Parts</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>AT&amp;T call records breach via Snowflake (UNC5537)</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_att-snowflake/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_att-snowflake/</guid><description>UNC5537 downloaded AT&amp;T call and text metadata for nearly all ~110 million AT&amp;T wireless customers, covering May–Oct 2022 and a small subset from Jan 2023. Data included call/text metadata and cell-site location approximations but not content or SSNs. AT&amp;T discovered the breach 19 April 2024; DOJ …</description><content:encoded><![CDATA[UNC5537 downloaded AT&amp;T call and text metadata for nearly all ~110 million AT&amp;T wireless customers, covering May–Oct 2022 and a small subset from Jan 2023. Data included call/text metadata and cell-site location approximations but not content or SSNs. AT&amp;T discovered the breach 19 April 2024; DOJ twice authorised disclosure delays (May 9 and June 5) citing national security concerns — unprecedented use of the SEC 8-K disclosure delay mechanism. AT&amp;T paid ~$370,000 in Bitcoin ransom to have the data deleted. Disclosure filed with SEC 12 July 2024. Part of the broader Snowflake campaign affecting 165+ organisations.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2024/07/12/att-phone-records-stolen-data-breach/</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-07-12</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform / AT&amp;T</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>AT&amp;T Snowflake Breach - 110 Million Customer Call Records</title><link>https://breachnotes.vulnetix.com/cloud/2024-07_att-snowflake-110million-metadata/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-07_att-snowflake-110million-metadata/</guid><description>Nearly 110 million AT&amp;T wireless customers had call and text metadata stolen — which numbers were contacted, call duration, and for some users cell tower location data. Data covered May 2022 through October 2022 (with some January 2023 records). This is a separate incident from the March 2024 AT&amp;T …</description><content:encoded><![CDATA[Nearly 110 million AT&amp;T wireless customers had call and text metadata stolen — which numbers were contacted, call duration, and for some users cell tower location data. Data covered May 2022 through October 2022 (with some January 2023 records). This is a separate incident from the March 2024 AT&amp;T dark web leak of 73M records. Connor Moucka (alias &lsquo;judische&rsquo;) and John Erin Binns were charged. AT&amp;T reportedly paid a $370,000 ransom to have a copy of the data deleted. Disclosed under SEC 8-K on 12 July 2024.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://krebsonsecurity.com/2024/07/hackers-steal-phone-sms-records-for-nearly-all-att-customers/</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-07-12</breach:dateOfCustomerNotification><breach:initialAttackVector>UNC5537 (Scattered Spider) used infostealer-harvested credentials to access AT&amp;T's Snowflake cloud environment without MFA; attackers exfiltrated call and SMS metadata records between 14-25 April 2024</breach:initialAttackVector><breach:vendorProduct>Snowflake (cloud data platform)</breach:vendorProduct><breach:malware>Lumma/Vidar/RedLine infostealers (used to harvest credentials)</breach:malware><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>LendingTree / QuoteWizard data breach via Snowflake (UNC5537 / Sp1d3r)</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_lendingtree-quotewizard-snowflake/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_lendingtree-quotewizard-snowflake/</guid><description>UNC5537 threat actor 'Sp1d3r' posted on BreachForums 1 June 2024 claiming 190 million individual records and 3 billion tracking pixel data records (2 TB compressed) stolen from LendingTree's QuoteWizard insurance comparison subsidiary via its Snowflake environment. Data included names, addresses, …</description><content:encoded><![CDATA[UNC5537 threat actor &lsquo;Sp1d3r&rsquo; posted on BreachForums 1 June 2024 claiming 190 million individual records and 3 billion tracking pixel data records (2 TB compressed) stolen from LendingTree&rsquo;s QuoteWizard insurance comparison subsidiary via its Snowflake environment. Data included names, addresses, phone numbers, dates of birth, driver&rsquo;s licence numbers, SSNs, and financial information. LendingTree confirmed the Snowflake connection on approximately 2 June 2024. Part of the broader Snowflake campaign affecting 165+ organisations. Class action lawsuits filed.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://therecord.media/lendingtree-quotewizard-cybersecurity-incident-snowflake</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-07-01</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform / LendingTree QuoteWizard subsidiary</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Neiman Marcus Snowflake Breach - 31M Email Addresses</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_neiman-marcus-snowflake-31m-email/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_neiman-marcus-snowflake-31m-email/</guid><description>Neiman Marcus (US luxury retailer) was breached as part of the UNC5537 mass-Snowflake campaign in May 2024. While the company notified Maine AG of 64,472 individuals, Troy Hunt (HaveIBeenPwned) identified 31 million email addresses in the dataset. Exposed data included names, contact info, dates of …</description><content:encoded>Neiman Marcus (US luxury retailer) was breached as part of the UNC5537 mass-Snowflake campaign in May 2024. While the company notified Maine AG of 64,472 individuals, Troy Hunt (HaveIBeenPwned) identified 31 million email addresses in the dataset. Exposed data included names, contact info, dates of birth, gift card data, transaction history, partial credit card numbers, and some SSNs and employee IDs. Neiman Marcus settled a class action lawsuit for $3.5 million.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/neiman-marcus-data-breach-31-million-email-addresses-found-exposed/</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-24</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-24</breach:dateOfCustomerNotification><breach:initialAttackVector>UNC5537 used infostealer-harvested credentials to access Neiman Marcus's Snowflake cloud environment without MFA</breach:initialAttackVector><breach:vendorProduct>Snowflake (cloud data warehouse)</breach:vendorProduct><breach:malware>VIDAR/RISEPRO/REDLINE infostealers (used to harvest Snowflake credentials)</breach:malware><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Ticketmaster / Live Nation data breach via Snowflake (UNC5537 / ShinyHunters)</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_ticketmaster-snowflake/</link><pubDate>Sun, 14 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_ticketmaster-snowflake/</guid><description>UNC5537 (ShinyHunters / Scattered Spider affiliates) used infostealer-harvested credentials to authenticate to Ticketmaster's Snowflake tenant which had no MFA configured. ShinyHunters listed 560 million customer records (1.3 TB) for sale on BreachForums for $500,000. Data included names, addresses, …</description><content:encoded>UNC5537 (ShinyHunters / Scattered Spider affiliates) used infostealer-harvested credentials to authenticate to Ticketmaster&amp;rsquo;s Snowflake tenant which had no MFA configured. ShinyHunters listed 560 million customer records (1.3 TB) for sale on BreachForums for $500,000. Data included names, addresses, phone numbers, partial credit card details, and event ticket barcodes. Part of a broader Snowflake campaign hitting ~165 organisations. Arrests made: Connor Riley Moucka arrested in Canada on 30 Oct 2024.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/ticketmaster-confirms-data-breach-after-snowflake-account-hack/</breach:sourceUrl><breach:dateOfBreach>2024-04-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials from infostealer malware reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform</breach:vendorProduct><breach:malware>VIDAR, RISEPRO, REDLINE, RACOON STEALER, LUMMA, METASTEALER (infostealers used to harvest credentials)</breach:malware><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>BleepingComputer</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-cylance-blackberry/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-cylance-blackberry/</guid><description>Cylance (a cybersecurity company owned by BlackBerry) confirmed in June 2024 that a data breach occurred involving a third-party cloud platform. The threat actor 'Sp1d3r' claimed to be selling 34 million customer and employee email records from Cylance on dark web forums. Cylance confirmed this was …</description><content:encoded>Cylance (a cybersecurity company owned by BlackBerry) confirmed in June 2024 that a data breach occurred involving a third-party cloud platform. The threat actor &amp;lsquo;Sp1d3r&amp;rsquo; claimed to be selling 34 million customer and employee email records from Cylance on dark web forums. Cylance confirmed this was legacy marketing data from before BlackBerry&amp;rsquo;s acquisition (2015-2018), not data from active customer security products. Cylance is not a Snowflake customer, contradicting initial reporting that tied the breach directly to the Snowflake UNC5537 campaign. BlackBerry stated no current customer, product, or operational data was compromised. The incident underscores that historical data assets accumulated through acquisitions remain a breach risk years after they are collected.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-10</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-522: Insufficiently Protected Credentials (infostealer-harvested credentials, no MFA on Snowflake account)</breach:initialAttackVector><breach:vendorProduct>Cylance/BlackBerry data warehouse (Snowflake)</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Los Angeles Unified School District (LAUSD) Snowflake Credential Breach</title><link>https://breachnotes.vulnetix.com/cloud/2024-06_lausd-snowflake/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-06_lausd-snowflake/</guid><description>Los Angeles Unified School District had student and teacher data stored in Snowflake accounts maintained by one or more third-party vendors. As part of the UNC5537 / ShinyHunters credential campaign targeting 160+ Snowflake customers, threat actor 'Sp1d3r' accessed LAUSD vendor accounts. In June …</description><content:encoded>Los Angeles Unified School District had student and teacher data stored in Snowflake accounts maintained by one or more third-party vendors. As part of the UNC5537 / ShinyHunters credential campaign targeting 160+ Snowflake customers, threat actor &amp;lsquo;Sp1d3r&amp;rsquo; accessed LAUSD vendor accounts. In June 2024, the attacker posted ~11 GB of data for sale on dark web forums for $1,000, allegedly containing 26+ million student records, 24,000 teacher records, and ~500 staff records. Exposed data included student names, addresses, financials, grades, performance scores, disability status, discipline details, parent information, and physical location data. LAUSD stated no direct compromise of its own systems; the breach was entirely via a third-party vendor&amp;rsquo;s unsecured Snowflake instance. Notable as the largest US K-12 breach linked to the Snowflake campaign.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/los-angeles-unified-confirms-student-data-stolen-in-snowflake-account-hack/</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-07-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Stolen credentials (via infostealer malware) used to access LAUSD vendor Snowflake account with no MFA configured; part of the broader UNC5537 Snowflake credential campaign</breach:initialAttackVector><breach:vendorProduct>Snowflake (cloud data platform)</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Mandiant / Wikipedia / CNBC / BleepingComputer</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-customers/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-customers/</guid><description>UNC5537 / Scattered Spider / ShinyHunters used credentials stolen by infostealer malware (some dating back to Nov 2020) to access 160+ Snowflake customer environments lacking MFA. Major victims: Ticketmaster (560M records), AT&amp;T (call/text records of ~110M customers), Santander, LendingTree, Advance …</description><content:encoded>UNC5537 / Scattered Spider / ShinyHunters used credentials stolen by infostealer malware (some dating back to Nov 2020) to access 160+ Snowflake customer environments lacking MFA. Major victims: Ticketmaster (560M records), AT&amp;amp;T (call/text records of ~110M customers), Santander, LendingTree, Advance Auto Parts, Neiman Marcus. Mandiant found 79.7% of compromised accounts used infostealer-stolen creds. Connor Moucka (Waifu/Judische) arrested Oct 2024 in Canada. $2M+ extorted from victims.</content:encoded><category>cloud</category><breach:sourceUrl>https://en.wikipedia.org/wiki/Snowflake_data_breach</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-30</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-522: Insufficiently Protected Credentials (infostealer-harvested credentials used against Snowflake instances lacking MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform</breach:vendorProduct><breach:malware>Redline Stealer / Lumma Stealer / Vidar / Raccoon Stealer / Risepro</breach:malware><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Neiman Marcus data breach via Snowflake (UNC5537)</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_neiman-marcus-snowflake/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_neiman-marcus-snowflake/</guid><description>UNC5537 accessed Neiman Marcus's Snowflake database between April and May 2024. Official notification to Maine AGO cited 64,472 individuals; however HIBP analysis identified 31 million customer email addresses in the dataset. Data included names, contact information, dates of birth, and gift card …</description><content:encoded>UNC5537 accessed Neiman Marcus&amp;rsquo;s Snowflake database between April and May 2024. Official notification to Maine AGO cited 64,472 individuals; however HIBP analysis identified 31 million customer email addresses in the dataset. Data included names, contact information, dates of birth, and gift card numbers. Threat actor claimed to also hold partial SSNs, transaction records, and millions of gift card numbers. Part of the broader Snowflake campaign.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/neiman-marcus-confirms-data-breach-after-snowflake-account-hack/</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-06-24</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-24</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-307: Improper Restriction of Excessive Authentication Attempts (stolen credentials reused against Snowflake tenant with no MFA)</breach:initialAttackVector><breach:vendorProduct>Snowflake cloud data platform / Neiman Marcus</breach:vendorProduct><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Snowflake UNC5537 Mass Customer Breach Campaign</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-unc5537-165-customers/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_snowflake-unc5537-165-customers/</guid><description>UNC5537 compromised approximately 165 Snowflake customer tenants in a mass credential-stuffing campaign from April 2024. Known victims include AT&amp;T (110M records), Ticketmaster (560M), Santander, Neiman Marcus, LendingTree/QuoteWizard, LAUSD, Pure Storage, Advance Auto Parts, and Cylance. …</description><content:encoded>UNC5537 compromised approximately 165 Snowflake customer tenants in a mass credential-stuffing campaign from April 2024. Known victims include AT&amp;amp;T (110M records), Ticketmaster (560M), Santander, Neiman Marcus, LendingTree/QuoteWizard, LAUSD, Pure Storage, Advance Auto Parts, and Cylance. Credentials dated back to 2020. Connor Moucka (&amp;lsquo;judische&amp;rsquo;) arrested Canada October 2024; John Erin Binns arrested Turkey. Mandiant (Google) published detailed threat intelligence report on UNC5537. Snowflake itself was not breached; all compromised accounts lacked MFA.</content:encoded><category>cloud</category><breach:sourceUrl>https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-30</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>UNC5537 (Scattered Spider / ShinyHunters) used credentials harvested by infostealer malware (Lumma, Vidar, RedLine, RisePro, Raccoon) to log into Snowflake customer accounts that lacked MFA; no breach of Snowflake's own platform</breach:initialAttackVector><breach:vendorProduct>Snowflake (cloud data warehouse)</breach:vendorProduct><breach:malware>Lumma; Vidar; RedLine; RisePro; Raccoon (infostealers used to harvest credentials)</breach:malware><breach:cloudProvider>Snowflake</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Ticketek Australia / TEG Cloud Data Breach</title><link>https://breachnotes.vulnetix.com/cloud/2024-05_ticketek-australia-teg-cloud/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-05_ticketek-australia-teg-cloud/</guid><description>Ticketek Australia (operated by TEG, Ticket Entertainment Group) disclosed a data breach in May/June 2024 involving a third-party cloud platform. A ShinyHunters-linked actor posted ~30 million rows of data on BreachForums, containing 17.6 million unique email addresses plus names, genders, dates of …</description><content:encoded>Ticketek Australia (operated by TEG, Ticket Entertainment Group) disclosed a data breach in May/June 2024 involving a third-party cloud platform. A ShinyHunters-linked actor posted ~30 million rows of data on BreachForums, containing 17.6 million unique email addresses plus names, genders, dates of birth, usernames, and hashed passwords. TEG confirmed customer names, dates of birth, and email addresses were impacted but did not confirm the specific cloud provider (Snowflake suspected). Passwords and credit card numbers were not exposed. This is separate from Ticketmaster&amp;rsquo;s Snowflake breach (a different entity). Have I Been Pwned added the breach to their database. Entertainment/ticketing sector breach; part of the broader 2024 cloud credential theft campaign.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.computerweekly.com/news/366587532/Ticketek-Australia-hit-by-data-breach</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-05-31</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Third-party cloud platform compromise; likely Snowflake credential theft via infostealer malware (not officially confirmed by TEG); ShinyHunters linked</breach:initialAttackVector><breach:vendorProduct>Snowflake (suspected third-party cloud platform)</breach:vendorProduct><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Walt Disney Company Internal Slack Data Breach (NullBulge)</title><link>https://breachnotes.vulnetix.com/cloud/2024-07_disney-slack-nullbulge/</link><pubDate>Mon, 01 Apr 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-07_disney-slack-nullbulge/</guid><description>Ryan Mitchell Kramer (alias 'NullBulge'), a 25-year-old from Santa Clarita, California, distributed a malicious AI art generation tool on GitHub. When a Disney employee downloaded it, Kramer stole credentials from the employee's 1Password password manager, then accessed approximately 10,000 internal …</description><content:encoded>Ryan Mitchell Kramer (alias &amp;lsquo;NullBulge&amp;rsquo;), a 25-year-old from Santa Clarita, California, distributed a malicious AI art generation tool on GitHub. When a Disney employee downloaded it, Kramer stole credentials from the employee&amp;rsquo;s 1Password password manager, then accessed approximately 10,000 internal Disney Slack channels. The breach occurred April–May 2024 and was publicly announced July 12, 2024, when 1.1 TB of data was posted on BreachForums. Stolen data included internal project details, messages, code, SSNs, login credentials, unreleased game assets, and personal photos. Disney subsequently moved away from Slack. Kramer agreed to plead guilty to two felony charges (unauthorized computer access and threatening to damage a protected computer). Initially presented as a Russian hacktivist group attack; later confirmed as a single US individual.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/hacker-nullbulge-pleads-guilty-to-stealing-disneys-slack-data/</breach:sourceUrl><breach:dateOfBreach>2024-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-07-12</breach:dateOfDisclosure><breach:initialAttackVector>Malicious file (trojanised AI art program) distributed via GitHub; credential theft from victim's 1Password password manager</breach:initialAttackVector><breach:vendorProduct>Slack</breach:vendorProduct><breach:cloudProvider>Slack</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>ConnectWise ScreenConnect CVE-2024-1709 Auth Bypass — Mass Exploitation by Multiple Threat Actors</title><link>https://breachnotes.vulnetix.com/cloud/2024-02_connectwise-screenconnect-auth-bypass/</link><pubDate>Mon, 19 Feb 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-02_connectwise-screenconnect-auth-bypass/</guid><description>On 19 February 2024, ConnectWise disclosed two critical vulnerabilities in ScreenConnect — an on-premises remote access tool used by managed service providers (MSPs) and IT teams globally. CVE-2024-1709 (CVSS 10.0) was an authentication bypass that allowed unauthenticated attackers to create admin …</description><content:encoded>On 19 February 2024, ConnectWise disclosed two critical vulnerabilities in ScreenConnect — an on-premises remote access tool used by managed service providers (MSPs) and IT teams globally. CVE-2024-1709 (CVSS 10.0) was an authentication bypass that allowed unauthenticated attackers to create admin accounts on ScreenConnect servers; CVE-2024-1708 was a path traversal that enabled code execution. ConnectWise released patches and published an advisory simultaneously. Within hours, multiple threat actors including ransomware groups began mass exploitation of on-premises ScreenConnect servers that had not yet been patched. CISA published Advisory AA24-057A on 27 February urging immediate patching. The exploitation was particularly severe because ScreenConnect is used by MSPs to manage thousands of client endpoints — a single compromised ScreenConnect server could provide attackers with access to all of that MSP&amp;rsquo;s clients simultaneously. Confirmed exploitation included: LockBit ransomware affiliates deploying ransomware through compromised ScreenConnect instances; the Bl00dy ransomware group targeting the education sector; and multiple nation-state adjacent actors. Huntress researchers estimated over 1,600 internet-exposed ScreenConnect servers were exploitable at time of disclosure. The vulnerabilities were used to deploy remote access trojans, conduct credential theft, and deliver ransomware across numerous victim organisations. The incident was comparable in MSP supply chain risk to the 2021 Kaseya VSA attack. Cloud-hosted ConnectWise ScreenConnect instances were automatically patched, but on-premises deployments required manual updates.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-057a</breach:sourceUrl><breach:dateOfBreach>2024-02-19</breach:dateOfBreach><breach:dateOfDisclosure>2024-02-19</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-02-19</breach:dateOfCustomerNotification><breach:initialAttackVector>Authentication bypass vulnerability (CVE-2024-1709, CVSS 10.0) in ConnectWise ScreenConnect — a widely-used remote desktop and access tool used by managed service providers (MSPs) — allowed unauthenticated remote attackers to bypass authentication and create new administrator accounts, leading to complete system compromise; a second path traversal vulnerability (CVE-2024-1708) also existed; multiple ransomware groups and nation-state actors exploited the vulnerabilities within hours of disclosure</breach:initialAttackVector><breach:cve>CVE-2024-1709</breach:cve><breach:cve>CVE-2024-1708</breach:cve><breach:vendorProduct>ConnectWise ScreenConnect (remote access / remote desktop tool for MSPs)</breach:vendorProduct><breach:softwarePackage>ScreenConnect</breach:softwarePackage><breach:malware>LockBit ransomware, Bl00dy ransomware, various RATs and backdoors deployed by multiple threat actors</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>ConnectWise</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Sisense Business Analytics Platform Breach (CISA Advisory)</title><link>https://breachnotes.vulnetix.com/cloud/2024-04_sisense-analytics-cisa-advisory/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-04_sisense-analytics-cisa-advisory/</guid><description>CISA issued an urgent advisory on 11 April 2024 warning Sisense customers to immediately rotate all credentials used with the platform. Sisense (a business intelligence/analytics SaaS serving critical infrastructure, defense, and Fortune 500 clients) had tokens, API keys, email account passwords, …</description><content:encoded>CISA issued an urgent advisory on 11 April 2024 warning Sisense customers to immediately rotate all credentials used with the platform. Sisense (a business intelligence/analytics SaaS serving critical infrastructure, defense, and Fortune 500 clients) had tokens, API keys, email account passwords, and SSL certificates stolen, giving attackers access to Sisense customers&amp;rsquo; connected third-party platforms including Salesforce, GitHub, Box, and BigQuery. The scale of downstream impact was unknown. CISA coordinated the response with Sisense and private sector partners.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/news-events/alerts/2024/04/11/compromise-sisense-customer-data</breach:sourceUrl><breach:dateOfBreach>2024-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-04-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-04-11</breach:dateOfCustomerNotification><breach:initialAttackVector>Attackers gained access to Sisense's self-hosted GitLab code repository, found credentials/tokens granting access to Sisense's Amazon S3 buckets in the cloud, and exfiltrated customer access tokens, API keys, passwords, and certificates</breach:initialAttackVector><breach:vendorProduct>GitLab (self-hosted); Amazon S3</breach:vendorProduct><breach:cloudProvider>Sisense</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Volkswagen Group CARIAD EV Location Data Leak (AWS Misconfiguration)</title><link>https://breachnotes.vulnetix.com/cloud/2024-12_volkswagen-cariad-aws-location/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-12_volkswagen-cariad-aws-location/</guid><description>Volkswagen Group's software subsidiary CARIAD left data on approximately 800,000 EV owners unencrypted and publicly accessible in AWS cloud storage for months. Affected brands: Volkswagen, Audi, SEAT, and Skoda. The exposed data included driver names, email addresses, phone numbers, home addresses, …</description><content:encoded>Volkswagen Group&amp;rsquo;s software subsidiary CARIAD left data on approximately 800,000 EV owners unencrypted and publicly accessible in AWS cloud storage for months. Affected brands: Volkswagen, Audi, SEAT, and Skoda. The exposed data included driver names, email addresses, phone numbers, home addresses, and precise vehicle location data (movement logs of when/where cars switched on and off). For 460,000+ vehicles, location data was accurate to within 10cm, enabling tracking of owners to homes, workplaces, and sensitive locations. An anonymous hacker discovered the breach and reported it to Germany&amp;rsquo;s Chaos Computer Club (CCC), which gave VW Group 30 days to remediate before public disclosure. No evidence of malicious exploitation. Volkswagen Group stated no customer action was required. Notable for the precision of location tracking exposed and the automotive/IoT sector privacy implications.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.csoonline.com/article/3631055/volkswagen-massive-data-leak-caused-by-a-failure-to-secure-aws-credentials.html</breach:sourceUrl><breach:dateOfBreach>2024-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-12-27</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2025-01-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Amazon Web Services (AWS) cloud storage misconfiguration: data left unencrypted and publicly accessible in S3 buckets managed by Volkswagen's software subsidiary CARIAD</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS) S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Volexity / CISA AA24-060B / Google Cloud / Akamai</title><link>https://breachnotes.vulnetix.com/cloud/2024-01_ivanti-connect-secure/</link><pubDate>Fri, 01 Dec 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-01_ivanti-connect-secure/</guid><description>Chinese nexus APT UNC5221 exploited chained zero-days in Ivanti Connect Secure VPN gateways starting Dec 2023, publicly disclosed Jan 10 2024 by Volexity. CVE-2023-46805 (auth bypass) + CVE-2024-21887 (command injection) allowed unauthenticated RCE. CISA itself was compromised via connected Ivanti …</description><content:encoded>Chinese nexus APT UNC5221 exploited chained zero-days in Ivanti Connect Secure VPN gateways starting Dec 2023, publicly disclosed Jan 10 2024 by Volexity. CVE-2023-46805 (auth bypass) + CVE-2024-21887 (command injection) allowed unauthenticated RCE. CISA itself was compromised via connected Ivanti products. Thousands of devices globally affected. Multiple custom malware families deployed. Ivanti&amp;rsquo;s initial integrity checker tool had a bypass. Patches took weeks to issue. State and local government agencies, defense contractors heavily targeted.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060b</breach:sourceUrl><breach:dateOfBreach>2023-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2024-01-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-01-11</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-305: Authentication Bypass by Primary Weakness chained with CWE-77: Command Injection</breach:initialAttackVector><breach:cve>CVE-2023-46805</breach:cve><breach:cve>CVE-2024-21887</breach:cve><breach:cve>CVE-2024-21893</breach:cve><breach:vendorProduct>Ivanti Connect Secure / Policy Secure</breach:vendorProduct><breach:malware>ZIPLINE backdoor / LIGHTWIRE webshell / WARPWIRE credential harvester / THINSPOOL dropper</breach:malware><breach:cloudProvider>Ivanti</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Cloudflare breach via stolen Okta credentials (nation-state, Thanksgiving 2023)</title><link>https://breachnotes.vulnetix.com/cloud/2024-01_cloudflare-midnight-blizzard/</link><pubDate>Tue, 14 Nov 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2024-01_cloudflare-midnight-blizzard/</guid><description>Nation-state threat actor (attributed to Midnight Blizzard / Cozy Bear / APT29 in some reporting) used one access token and three service account credentials stolen during the Okta support case management breach (October 2023) to access Cloudflare's internal systems. Reconnaissance November 14–17 …</description><content:encoded>Nation-state threat actor (attributed to Midnight Blizzard / Cozy Bear / APT29 in some reporting) used one access token and three service account credentials stolen during the Okta support case management breach (October 2023) to access Cloudflare&amp;rsquo;s internal systems. Reconnaissance November 14–17 2023; returned November 20–21 and accessed source code management systems. Cloudflare failed to rotate the credentials assuming they were unused. Limited source code and internal documentation on global network architecture exfiltrated. No customer data or Cloudflare services impacted. Zero-trust architecture and hard security keys limited lateral movement. Disclosed publicly 1 February 2024. This was a downstream consequence of the Okta supply chain.</content:encoded><category>cloud</category><breach:sourceUrl>https://blog.cloudflare.com/thanksgiving-2023-security-incident/</breach:sourceUrl><breach:dateOfBreach>2023-11-14</breach:dateOfBreach><breach:dateOfDisclosure>2024-02-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2024-02-01</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-287: Improper Authentication (stolen access tokens and service account credentials from Okta October 2023 breach reused; Cloudflare failed to rotate them)</breach:initialAttackVector><breach:vendorProduct>Cloudflare internal systems (Atlassian Confluence wiki, Jira bug tracker, Bitbucket source code)</breach:vendorProduct><breach:cloudProvider>Cloudflare</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Sumo Logic AWS Access Key Compromise</title><link>https://breachnotes.vulnetix.com/cloud/2023-11_sumo-logic-aws-access-key/</link><pubDate>Fri, 03 Nov 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-11_sumo-logic-aws-access-key/</guid><description>On November 3, 2023, Sumo Logic, a cloud-native security analytics and log management platform, discovered that a compromised AWS access key had been used to gain unauthorized access to their AWS environment. Sumo Logic immediately rotated the compromised credentials, locked down API access, and …</description><content:encoded>On November 3, 2023, Sumo Logic, a cloud-native security analytics and log management platform, discovered that a compromised AWS access key had been used to gain unauthorized access to their AWS environment. Sumo Logic immediately rotated the compromised credentials, locked down API access, and began an investigation. The company notified customers on November 7 and recommended they rotate their Sumo Logic API access keys and third-party credentials stored in Sumo Logic as a precaution. The attacker did not appear to exfiltrate customer data, but the incident highlighted the risk of long-lived AWS access keys and the importance of timely credential rotation.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/sumo-logic-discloses-security-breach-via-compromised-aws-credentials/</breach:sourceUrl><breach:dateOfBreach>2023-11-03</breach:dateOfBreach><breach:dateOfDisclosure>2023-11-07</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-11-07</breach:dateOfCustomerNotification><breach:initialAttackVector>A threat actor used a compromised AWS access key credential belonging to Sumo Logic to gain unauthorized access to Sumo Logic's AWS infrastructure</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:iam::{account}:access-key</breach:cloudResourceCrit></item><item><title>1Password Third-Party Breach (November 2023)</title><link>https://breachnotes.vulnetix.com/cloud/2023-11_1password-okta/</link><pubDate>Wed, 01 Nov 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-11_1password-okta/</guid><description>Okta breach: 134 customers exposed in October support system hack. Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five of them later being targeted in session hijacking attacks with the help of stolen session tokens. "From …</description><content:encoded><![CDATA[Okta breach: 134 customers exposed in October support system hack. Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five of them later being targeted in session hijacking attacks with the help of stolen session tokens. &ldquo;From September 28, 2023 to October 17, 2023, a threat actor gained unauthorized access to files inside Okta&rsquo;s customer support system associated with 134 Okta customers, or less than 1% of Okta customers,&rdquo; Okta revealed. &ldquo;Some of these files were HAR files that contained session tokens which could in turn be used for session hijacking attacks. The threat actor was able to use these session tokens to hijack the legitimate Okta sessions of 5 customers, 3 of whom have shared their own response to this event.&rdquo;. Third-party company: Okta.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/okta-breach-134-customers-exposed-in-october-support-system-hack/</breach:sourceUrl><breach:dateOfBreach>2023-11-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-11-03</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Okta</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Mercedes-Benz GitHub Token Exposure — Source Code Repository Access</title><link>https://breachnotes.vulnetix.com/cloud/2023-09_mercedes-benz-github-token/</link><pubDate>Fri, 29 Sep 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-09_mercedes-benz-github-token/</guid><description>In January 2024 (revealed for an exposure dating to September 2023), RedHunt Labs security researchers discovered that a GitHub API authentication token belonging to a Mercedes-Benz employee had been inadvertently published in a public GitHub repository. The token provided read access to the …</description><content:encoded>In January 2024 (revealed for an exposure dating to September 2023), RedHunt Labs security researchers discovered that a GitHub API authentication token belonging to a Mercedes-Benz employee had been inadvertently published in a public GitHub repository. The token provided read access to the entirety of Mercedes-Benz&amp;rsquo;s GitHub Enterprise organization — including all private repositories — with no expiration date. Mercedes-Benz confirmed the incident, stating that the token had been published in a public repository unintentionally. The token was active and provided access to Mercedes-Benz&amp;rsquo;s entire internal codebase, potentially including proprietary vehicle software, engineering designs, and internal tooling. Mercedes-Benz revoked the token immediately after being notified by RedHunt Labs. The company stated that no customer data was compromised. The incident highlighted several security failures: no secret scanning to detect token commits, lack of token expiration policies, and inadequate monitoring of developer credential hygiene. This type of exposure — an authentication token committed to a public repository — is extremely common; GitHub Secret Scanning detects millions of such exposures annually. The Mercedes-Benz case received attention due to the company&amp;rsquo;s scale (a major automotive manufacturer) and the breadth of access the single token provided.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/mercedes-benz-accidentally-exposed-its-github-token-leaking-source-code/</breach:sourceUrl><breach:dateOfBreach>2023-09-29</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-26</breach:dateOfDisclosure><breach:initialAttackVector>A Mercedes-Benz employee inadvertently included a GitHub API token in a public GitHub repository; the token provided unrestricted read access (with no expiration date) to the entire Mercedes-Benz Enterprise GitHub organization, allowing access to all private repositories</breach:initialAttackVector><breach:vendorProduct>Mercedes-Benz GitHub Enterprise organization / source code repositories</breach:vendorProduct><breach:cloudProvider>GitHub</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Okta October 2023 Support System Breach — All Customer Support Users Affected</title><link>https://breachnotes.vulnetix.com/cloud/2023-09_okta-support-system-breach/</link><pubDate>Thu, 28 Sep 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-09_okta-support-system-breach/</guid><description>On 28 September 2023, an attacker used a stolen service account credential to gain access to Okta's customer support case management system. The attacker downloaded a report containing data for all 18,400 customers in Okta's customer support system. The stolen credential was from an Okta employee …</description><content:encoded><![CDATA[On 28 September 2023, an attacker used a stolen service account credential to gain access to Okta&rsquo;s customer support case management system. The attacker downloaded a report containing data for all 18,400 customers in Okta&rsquo;s customer support system. The stolen credential was from an Okta employee who had saved their work credentials in their personal Google Chrome browser profile on a work device, then signed into their personal Google account. The personal Google account was compromised, exposing the saved credential. The attacker used access to the support system to view HAR (HTTP Archive) files that customers had shared for debugging — these files contain sensitive session tokens and cookies. The attacker used stolen session tokens to hijack active Okta sessions at BeyondTrust and Cloudflare (among others). Cloudflare detected the attack on the same day; BeyondTrust had alerted Okta in early October, but Okta took approximately two weeks to confirm the root cause. Okta&rsquo;s October 2023 disclosure stated initially that only 134 customers were affected; Okta revised this to &lsquo;all customers in the support system&rsquo; in November 2023. The full extent — 18,400 customers — was disclosed only after additional investigation. The breach was Okta&rsquo;s fourth significant security incident in two years (following the January 2022 Lapsus$ breach, a 2022 source code theft, and a 2023 1Password-related incident). Okta&rsquo;s identity platform is used by over 18,000 organizations for SSO — making any Okta breach extremely high-impact for downstream organisations.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://sec.okta.com/harfiles</breach:sourceUrl><breach:dateOfBreach>2023-09-28</breach:dateOfBreach><breach:dateOfDisclosure>2023-10-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-11-29</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker used a stolen credential to access Okta's customer support case management system (Salesforce Service Cloud); the credential was compromised because an Okta employee had signed into their personal Google account on a work device, and the credential was stored in the personal Google account which was later breached</breach:initialAttackVector><breach:vendorProduct>Okta Customer Support System (Salesforce Service Cloud)</breach:vendorProduct><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Okta Security / BeyondTrust / BleepingComputer</title><link>https://breachnotes.vulnetix.com/cloud/2023-10_okta-support-system/</link><pubDate>Thu, 28 Sep 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-10_okta-support-system/</guid><description>Threat actor accessed Okta customer support case management system Sept 28 - Oct 17 2023 using credentials stolen from an employee's personal Google account. 134 Okta customers affected (&lt;1%). Stolen HAR files contained session tokens used for session hijacking against 5 customers including …</description><content:encoded>Threat actor accessed Okta customer support case management system Sept 28 - Oct 17 2023 using credentials stolen from an employee&amp;rsquo;s personal Google account. 134 Okta customers affected (&amp;lt;1%). Stolen HAR files contained session tokens used for session hijacking against 5 customers including BeyondTrust, Cloudflare, and 1Password. Session tokens from support HAR files enabled account takeover. Okta&amp;rsquo;s disclosure came after customers independently detected attacks.</content:encoded><category>cloud</category><breach:sourceUrl>https://sec.okta.com/articles/2023/11/unauthorized-access-oktas-support-case-management-system-root-cause</breach:sourceUrl><breach:dateOfBreach>2023-09-28</breach:dateOfBreach><breach:dateOfDisclosure>2023-10-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-10-20</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-522: Insufficiently Protected Credentials (employee personal Google account compromise exposing corporate credentials)</breach:initialAttackVector><breach:vendorProduct>Okta Customer Support System</breach:vendorProduct><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>BleepingComputer / Morphisec / CSHub</title><link>https://breachnotes.vulnetix.com/cloud/2023-09_mgm-resorts/</link><pubDate>Fri, 08 Sep 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-09_mgm-resorts/</guid><description>Scattered Spider (UNC3944) used LinkedIn to identify MGM employee, called IT helpdesk impersonating them to get Okta/Azure admin access. Waited 2 days then launched ransomware against 100+ ESXi hypervisors on Sept 11. Slot machines, digital room keys, reservation systems offline for ~10 days. …</description><content:encoded>Scattered Spider (UNC3944) used LinkedIn to identify MGM employee, called IT helpdesk impersonating them to get Okta/Azure admin access. Waited 2 days then launched ransomware against 100+ ESXi hypervisors on Sept 11. Slot machines, digital room keys, reservation systems offline for ~10 days. ALPHV/BlackCat claimed 6TB data exfiltrated. MGM refused to pay. $100M Q3 2023 loss. Customer PII including SSNs exposed. Five Scattered Spider members charged in 2024.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/mgm-resorts-ransomware-attack-led-to-100-million-loss-data-theft/</breach:sourceUrl><breach:dateOfBreach>2023-09-08</breach:dateOfBreach><breach:dateOfDisclosure>2023-09-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-10-20</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-1391: Use of Weak Credentials (social engineering via LinkedIn identity theft + vishing helpdesk to bypass Okta MFA)</breach:initialAttackVector><breach:vendorProduct>MGM Resorts enterprise systems / Okta / VMware ESXi</breach:vendorProduct><breach:malware>ALPHV/BlackCat</breach:malware><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>"Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach"</title><link>https://breachnotes.vulnetix.com/cloud/2023-09_stolen-lastpass-vaults-possibly-cracked/</link><pubDate>Tue, 05 Sep 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-09_stolen-lastpass-vaults-possibly-cracked/</guid><description>In November 2022, popular password management tool LastPass disclosed that hackers had stolen "password vaults" containing data belonging to more than 25 million users. Although the vaults themselves are encrypted, some experts now believe that these vaults are being cracked to enable access to …</description><content:encoded><![CDATA[<p>In November 2022, popular password management tool LastPass disclosed that hackers had stolen &ldquo;password vaults&rdquo; containing data belonging to more than 25 million users. Although the vaults themselves are encrypted, some experts now believe that these vaults are being cracked to enable access to crypto credentials stored within.A report by cybersecurity expert Brian Krebs outlines how various experts have come to this conclusion after analyzing a long string of crypto thefts perpetrated against people with otherwise strong security practices. Altogether, the thefts suspected to have been enabled by the LastPass breach amount to more than $35 million.</p>
<p>Total loss estimated at $35,000,000.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/</breach:sourceUrl><breach:dateOfBreach>2023-09-05</breach:dateOfBreach><breach:dateOfDisclosure>2023-09-05</breach:dateOfDisclosure><breach:initialAttackVector>Smart contract exploit / hack</breach:initialAttackVector><breach:vendorProduct>Stolen LastPass vaults possibly cracked</breach:vendorProduct><breach:financialLossUsd>35000000</breach:financialLossUsd><breach:affectedCount>25000000</breach:affectedCount><breach:cloudProvider>LastPass</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Cybersecurity Dive / Chainalysis / McGriff</title><link>https://breachnotes.vulnetix.com/cloud/2023-08_caesars-entertainment/</link><pubDate>Fri, 18 Aug 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-08_caesars-entertainment/</guid><description>Scattered Spider targeted Caesars' outsourced IT support vendor Aug 18 2023 via voice phishing, convincing vendor to hand over Okta credentials. Within days accessed 6TB loyalty program database with SSNs and driver's licenses of 65M+ rewards members. $30M ransom demanded; Caesars paid $15M in …</description><content:encoded>Scattered Spider targeted Caesars&amp;rsquo; outsourced IT support vendor Aug 18 2023 via voice phishing, convincing vendor to hand over Okta credentials. Within days accessed 6TB loyalty program database with SSNs and driver&amp;rsquo;s licenses of 65M+ rewards members. $30M ransom demanded; Caesars paid $15M in cryptocurrency. Breach discovered Sept 7, SEC 8-K filed. Unlike MGM (same group same week), quick ransom payment avoided operational disruption. FBI involved; Chainalysis tracked ransom funds.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cybersecuritydive.com/news/caesars-social-engineering-breach/695995/</breach:sourceUrl><breach:dateOfBreach>2023-08-18</breach:dateOfBreach><breach:dateOfDisclosure>2023-09-07</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-09-14</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-1390: Weak Authentication (vishing / voice phishing social engineering of outsourced IT vendor to bypass Okta MFA)</breach:initialAttackVector><breach:vendorProduct>Caesars Entertainment loyalty program database / Okta</breach:vendorProduct><breach:malware>Scattered Spider ransomware</breach:malware><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Storm-0558 Microsoft Exchange Online hack — US State Department and 22 organisations</title><link>https://breachnotes.vulnetix.com/cloud/2023-05_storm-0558-microsoft-exchange/</link><pubDate>Mon, 15 May 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-05_storm-0558-microsoft-exchange/</guid><description>Storm-0558, a Chinese state-sponsored threat actor (attributed to MSS), acquired a Microsoft MSA consumer token signing key (method of acquisition still unclear as of CSRB review) and used it to forge authentication tokens granting access to Exchange Online mailboxes at 22 organisations and 503+ …</description><content:encoded><![CDATA[Storm-0558, a Chinese state-sponsored threat actor (attributed to MSS), acquired a Microsoft MSA consumer token signing key (method of acquisition still unclear as of CSRB review) and used it to forge authentication tokens granting access to Exchange Online mailboxes at 22 organisations and 503+ individuals globally. Attack began 15 May 2023. US State Department discovered the intrusion 15 June 2023 via anomaly detection and alerted Microsoft. Approximately 60,000 State Department emails downloaded. US Commerce Department Secretary Gina Raimondo&rsquo;s email also compromised. CSRB review (March 2024) concluded the breach was &rsquo;entirely preventable&rsquo; and cited a &lsquo;cascade of Microsoft security failures.&rsquo; Separate from the November 2023 Midnight Blizzard/Cozy Bear attack on Microsoft.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.microsoft.com/en-us/security/blog/2023/07/14/analysis-of-storm-0558-techniques-for-unauthorized-email-access/</breach:sourceUrl><breach:dateOfBreach>2023-05-15</breach:dateOfBreach><breach:dateOfDisclosure>2023-07-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-07-11</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-287: Improper Authentication (forged authentication tokens using a stolen Microsoft MSA consumer signing key; used to access Exchange Online accounts across enterprise and personal tenants)</breach:initialAttackVector><breach:vendorProduct>Microsoft Exchange Online / Microsoft Azure AD (Entra ID)</breach:vendorProduct><breach:cloudProvider>Azure</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Discord Third-Party Breach (May 2023)</title><link>https://breachnotes.vulnetix.com/cloud/2023-05_discord-zendesk/</link><pubDate>Mon, 01 May 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-05_discord-zendesk/</guid><description>Discord Informs Users of Data Breach Involving Customer Support Provider. This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the …</description><content:encoded><![CDATA[Discord Informs Users of Data Breach Involving Customer Support Provider. This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy. We won&rsquo;t track your information when you visit our site. But in order to comply with your preferences, we&rsquo;ll have to use just one tiny cookie so that you&rsquo;re not asked to make this choice again. <a href="https://www.facebook.com/SecurityWeekCom-366251913615/"></a><a href="https://twitter.com/securityweek"></a><a href="https://www.linkedin.com/company/securityweek/"></a>. Third-party company: Zendesk.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.securityweek.com/discord-informs-users-of-data-breach-involving-customer-support-provider/</breach:sourceUrl><breach:dateOfBreach>2023-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-05-15</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Zendesk</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Zendesk</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Atlassian Third-Party Breach (February 2023)</title><link>https://breachnotes.vulnetix.com/cloud/2023-02_atlassian-envoy/</link><pubDate>Wed, 01 Feb 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-02_atlassian-envoy/</guid><description>Atlassian data leak caused by stolen employee credentials. Atlassian has confirmed that a breach at a third-party vendor caused a recent leak of company data and that their network and customer information is secure. 2/17/23: Story and title updated to reflect new statements from both companies. …</description><content:encoded>Atlassian data leak caused by stolen employee credentials. Atlassian has confirmed that a breach at a third-party vendor caused a recent leak of company data and that their network and customer information is secure. 2/17/23: Story and title updated to reflect new statements from both companies. Atlassian suffered a data leak after threat actors used stolen employee credentials to steal data from a third-party vendor. However, the company says its network and customer information are secure. Third-party company: Envoy.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/atlassian-data-leak-caused-by-stolen-employee-credentials/</breach:sourceUrl><breach:dateOfBreach>2023-02-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-02-16</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Envoy</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Atlassian</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Datadog RPM Signing Key Exposed via CircleCI Breach</title><link>https://breachnotes.vulnetix.com/cloud/2023-01_datadog-circleci/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-01_datadog-circleci/</guid><description>In January 2023, Datadog disclosed that its RPM (Red Hat Package Manager) signing key used to sign Datadog age
nt packages had been exposed in the CircleCI breach. CircleCI's January 2023 breach involved malware on a Circ
leCI engineer's laptop stealing a session token, allowing attackers to access …</description><content:encoded>In January 2023, Datadog disclosed that its RPM (Red Hat Package Manager) signing key used to sign Datadog age
nt packages had been exposed in the CircleCI breach. CircleCI&amp;rsquo;s January 2023 breach involved malware on a Circ
leCI engineer&amp;rsquo;s laptop stealing a session token, allowing attackers to access customer environment variables a
nd secrets stored in CircleCI pipelines. Datadog used CircleCI for CI/CD and stored the RPM signing key as an
environment variable. Datadog immediately rotated the signing key and released new package versions. Users wer
e advised to verify package signatures and update to versions signed with the new key. While Datadog stated th
ere was no evidence the key was misused to sign malicious packages, the exposure required precautionary remedi
ation across all Datadog agent deployments using RPM packages.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.secureblink.com/cyber-security-news/datadog-rpm-signing-key-exposed-in-circle-ci-hack</breach:sourceUrl><breach:dateOfBreach>2023-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-01</breach:dateOfDisclosure><breach:initialAttackVector>CircleCI's January 2023 breach (malware on engineer laptop stole session token) allowed attackers to access CircleCI customer secrets; Datadog's RPM package signing key was stored in CircleCI CI/CD environment variables and was exposed</breach:initialAttackVector><breach:vendorProduct>CircleCI CI/CD platform (customer secrets/environment variables)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>CircleCI</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Mailchimp Social Engineering Breach — 133 Customers Affected Including Trezor, Fanatics, WooCommerce</title><link>https://breachnotes.vulnetix.com/cloud/2023-01_fanduels-mailchimp/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-01_fanduels-mailchimp/</guid><description>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp's internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 …</description><content:encoded>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp&amp;rsquo;s internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 accounts. Affected accounts included crypto-related businesses (Trezor hardware wallet — whose subscriber list was used to send phishing emails to Trezor customers), sports merchandise retailer Fanatics, WooCommerce, and others. The Trezor incident had significant downstream impact: attackers sent phishing emails to Trezor customers claiming a security breach and directing them to a fake Trezor site to enter their seed phrases — a direct attempt to steal cryptocurrency funds. Mailchimp disclosed the breach on 4 April 2022. A second Mailchimp social engineering breach occurred in August 2022, affecting DigitalOcean and others. A third breach occurred in January 2023, affecting 133 accounts. The repeated breaches at Mailchimp highlighted the difficulty of protecting SaaS platforms against social engineering targeting internal support staff who necessarily have access to customer data.</content:encoded><category>cloud</category><breach:sourceUrl>https://mailchimp.com/newsroom/important-update-about-mailchimp-security/</breach:sourceUrl><breach:dateOfBreach>2023-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-01</breach:dateOfDisclosure><breach:initialAttackVector>Attackers used social engineering to target Mailchimp customer-facing operations staff, obtaining credentials to access internal tools used by Mailchimp's customer support and account administration teams; the attackers then used this access to view and export customer list data</breach:initialAttackVector><breach:vendorProduct>Mailchimp email marketing platform (internal admin tools)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Mailchimp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Mailchimp Social Engineering Breach — 133 Customers Affected Including Trezor, Fanatics, WooCommerce</title><link>https://breachnotes.vulnetix.com/cloud/2023-01_solana-foundation-mailchimp/</link><pubDate>Sun, 01 Jan 2023 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-01_solana-foundation-mailchimp/</guid><description>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp's internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 …</description><content:encoded>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp&amp;rsquo;s internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 accounts. Affected accounts included crypto-related businesses (Trezor hardware wallet — whose subscriber list was used to send phishing emails to Trezor customers), sports merchandise retailer Fanatics, WooCommerce, and others. The Trezor incident had significant downstream impact: attackers sent phishing emails to Trezor customers claiming a security breach and directing them to a fake Trezor site to enter their seed phrases — a direct attempt to steal cryptocurrency funds. Mailchimp disclosed the breach on 4 April 2022. A second Mailchimp social engineering breach occurred in August 2022, affecting DigitalOcean and others. A third breach occurred in January 2023, affecting 133 accounts. The repeated breaches at Mailchimp highlighted the difficulty of protecting SaaS platforms against social engineering targeting internal support staff who necessarily have access to customer data.</content:encoded><category>cloud</category><breach:sourceUrl>https://mailchimp.com/newsroom/important-update-about-mailchimp-security/</breach:sourceUrl><breach:dateOfBreach>2023-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-01</breach:dateOfDisclosure><breach:initialAttackVector>Attackers used social engineering to target Mailchimp customer-facing operations staff, obtaining credentials to access internal tools used by Mailchimp's customer support and account administration teams; the attackers then used this access to view and export customer list data</breach:initialAttackVector><breach:vendorProduct>Mailchimp email marketing platform (internal admin tools)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Mailchimp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>CircleCI Secrets Breach — Customer Environment Variables, Tokens, and Keys Stolen</title><link>https://breachnotes.vulnetix.com/cloud/2022-12_circleci-secrets-breach/</link><pubDate>Fri, 16 Dec 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-12_circleci-secrets-breach/</guid><description>In December 2022 (disclosed 4 January 2023), CircleCI — a widely-used CI/CD platform with over 500,000 developer users — discovered that an attacker had stolen customer environment variables, tokens, and keys. The attack was enabled by malware on a CircleCI engineer's laptop that stole the …</description><content:encoded><![CDATA[In December 2022 (disclosed 4 January 2023), CircleCI — a widely-used CI/CD platform with over 500,000 developer users — discovered that an attacker had stolen customer environment variables, tokens, and keys. The attack was enabled by malware on a CircleCI engineer&rsquo;s laptop that stole the engineer&rsquo;s SSO session cookie, bypassing 2FA. The stolen session was used to access and exfiltrate CircleCI&rsquo;s customer secrets stored in their pipeline configuration. CircleCI stores environment variables that developers set in their CI/CD pipelines — these often contain cloud provider API keys, database credentials, SSH keys, and other sensitive secrets. All CircleCI customers were advised to rotate any secrets stored in CircleCI immediately. Some customers received alerts from GitHub, AWS, and other services about suspicious use of their credentials in the days surrounding the disclosure. GitHub notified customers of potentially compromised OAuth tokens. CircleCI&rsquo;s investigation determined the attacker had access to some customer data during the period of 16 December 2022 to 4 January 2023. All customer environment variables on the CircleCI platform were encrypted at rest with per-customer encryption keys — however, the attacker obtained both the encrypted data and the decryption keys from production. The incident highlighted how CI/CD platforms are a prime target for credential theft given the concentration of secrets they store.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://circleci.com/blog/january-4-2023-security-alert/</breach:sourceUrl><breach:dateOfBreach>2022-12-16</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-04</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-01-04</breach:dateOfCustomerNotification><breach:initialAttackVector>Malware was deployed on a CircleCI engineer's laptop that had access to production systems; the malware stole a valid session cookie and bypassed 2FA, allowing the attacker to impersonate the engineer's session; the attacker then exfiltrated customer data and encryption keys from CircleCI's production infrastructure</breach:initialAttackVector><breach:vendorProduct>CircleCI CI/CD platform (customer environment variables and secrets)</breach:vendorProduct><breach:cloudProvider>CircleCI</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>CommuteAir Jenkins Misconfiguration Exposes AWS Credentials and No-Fly List</title><link>https://breachnotes.vulnetix.com/cloud/2023-01_commuteair-jenkins-aws-s3/</link><pubDate>Thu, 01 Dec 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-01_commuteair-jenkins-aws-s3/</guid><description>In January 2023, a security researcher discovered that CommuteAir, a US regional airline, had a publicly exposed Jenkins build server with no authentication required. The Jenkins environment contained hardcoded AWS access keys in pipeline configurations. Using these credentials, the researcher …</description><content:encoded>In January 2023, a security researcher discovered that CommuteAir, a US regional airline, had a publicly exposed Jenkins build server with no authentication required. The Jenkins environment contained hardcoded AWS access keys in pipeline configurations. Using these credentials, the researcher accessed multiple CommuteAir S3 buckets and discovered one containing a 2019 version of the TSA No Fly List — a sensitive government document listing individuals prohibited from boarding commercial aircraft in the US. The researcher shared the No Fly List on a hacking forum, leading to the public exposure. The incident demonstrated the systemic risk of hardcoded cloud credentials in CI/CD pipelines and the chain of consequences when airline/government data is co-mingled with inadequately secured infrastructure.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/us-no-fly-list-shared-on-hacking-forum-exposes-security-lapses/</breach:sourceUrl><breach:dateOfBreach>2022-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2023-01-19</breach:dateOfDisclosure><breach:initialAttackVector>A publicly accessible Jenkins CI/CD server misconfiguration at CommuteAir exposed AWS credentials, which a security researcher used to access multiple S3 buckets — including one containing the TSA's No Fly List</breach:initialAttackVector><breach:vendorProduct>Jenkins (CI/CD); Amazon S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>LastPass Second Breach — Source Code Used to Target Employee, Decrypt Customer Vault Backups</title><link>https://breachnotes.vulnetix.com/cloud/2022-11_lastpass-devops-keylogger/</link><pubDate>Wed, 30 Nov 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-11_lastpass-devops-keylogger/</guid><description>In November-December 2022, attackers who had previously breached LastPass in August 2022 (stealing source code and technical documentation) used that information to identify and target a senior DevOps engineer who had access to LastPass's cloud backup environment. The attackers exploited a known …</description><content:encoded><![CDATA[In November-December 2022, attackers who had previously breached LastPass in August 2022 (stealing source code and technical documentation) used that information to identify and target a senior DevOps engineer who had access to LastPass&rsquo;s cloud backup environment. The attackers exploited a known vulnerability in the Plex Media Server software (CVE-2023-15955) installed on the engineer&rsquo;s personal home computer to deploy a keylogger, capturing the engineer&rsquo;s LastPass master password and MFA authentication codes. Using the stolen credentials, attackers accessed the engineer&rsquo;s LastPass corporate vault and extracted decryption keys for the AWS S3 cloud storage containing LastPass customer vault backups. The stolen data included encrypted customer password vaults, basic customer account information, billing addresses, email addresses, phone numbers, and partial credit card data. The password vaults were encrypted with AES-256, but the encryption was only as strong as each customer&rsquo;s master password. LastPass disclosed the full extent of the breach in December 2022 and additional details in February-March 2023. The incident demonstrated a sophisticated two-stage attack: use stolen developer knowledge to identify and target an individual insider. Billions of password vaults — some with weak master passwords — were potentially crackable by offline brute force. Security researchers linked subsequent cryptocurrency thefts (totalling over $35 million) to cracked LastPass vaults. The FTC began an investigation into LastPass&rsquo;s security practices.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/</breach:sourceUrl><breach:dateOfBreach>2022-11-30</breach:dateOfBreach><breach:dateOfDisclosure>2022-12-22</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-12-22</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker used information stolen in the August 2022 LastPass breach (source code and technical data) to target a senior LastPass DevOps engineer at home; exploited a vulnerable third-party media software package on the engineer's personal computer to install a keylogger; captured the employee's master password and MFA credentials to access their LastPass corporate vault; then accessed a LastPass AWS S3 cloud backup containing encrypted customer password vaults</breach:initialAttackVector><breach:vendorProduct>LastPass cloud storage / AWS S3 customer vault backups</breach:vendorProduct><breach:malware>Keylogger (via vulnerable Plex Media Server)</breach:malware><breach:cloudProvider>LastPass</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>FTX Bankruptcy AWS Multi-Account Secrets Compromise</title><link>https://breachnotes.vulnetix.com/cloud/2022-11_ftx-aws-secrets-compromise/</link><pubDate>Fri, 11 Nov 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-11_ftx-aws-secrets-compromise/</guid><description>On November 11-12, 2022, within hours of FTX's bankruptcy filing, approximately $400 million was drained from FTX exchange and FTX US wallets in a series of unauthorized transactions. The FTX new management team confirmed the hack on November 12. The attackers had obtained access to AWS …</description><content:encoded>On November 11-12, 2022, within hours of FTX&amp;rsquo;s bankruptcy filing, approximately $400 million was drained from FTX exchange and FTX US wallets in a series of unauthorized transactions. The FTX new management team confirmed the hack on November 12. The attackers had obtained access to AWS infrastructure containing private key material and AWS credentials for multiple FTX-related entities. US authorities later charged former FTX executive Ryan Salame and others, but the theft investigation pointed to a separate intrusion distinct from Sam Bankman-Fried&amp;rsquo;s alleged fraud. The incident occurred at a uniquely chaotic moment when FTX staff were losing access to systems and it was initially unclear whether the withdrawals were unauthorized transfers or an authorized attempt to protect assets. Approximately $220M was ultimately frozen or recovered.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/ftx-hackers-stole-400-million-shortly-after-bankruptcy-filing/</breach:sourceUrl><breach:dateOfBreach>2022-11-11</breach:dateOfBreach><breach:dateOfDisclosure>2022-11-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-11-12</breach:dateOfCustomerNotification><breach:initialAttackVector>Attackers (believed to be either FTX insiders or nation-state actors) accessed AWS infrastructure secrets and private key material for multiple FTX-affiliated entities shortly after FTX filed for bankruptcy, draining approximately $400M from FTX and related exchange wallets</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>LastPass Blog / Wikipedia / Cybersecurity Dive</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_lastpass/</link><pubDate>Mon, 08 Aug 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_lastpass/</guid><description>Two-stage breach in 2022. Aug 8-11: attacker compromised software developer's laptop, stole 14 source code repositories. Aug 12: senior DevOps engineer's personal computer compromised via unpatched Plex CVE-2020-5741; keylogger captured master password. Aug-Sept: attacker exfiltrated customer vault …</description><content:encoded>Two-stage breach in 2022. Aug 8-11: attacker compromised software developer&amp;rsquo;s laptop, stole 14 source code repositories. Aug 12: senior DevOps engineer&amp;rsquo;s personal computer compromised via unpatched Plex CVE-2020-5741; keylogger captured master password. Aug-Sept: attacker exfiltrated customer vault backup and user database from third-party cloud storage. Stolen data includes encrypted password vaults and unencrypted metadata (URLs, email, billing addresses). Feds linked ~$150M crypto theft to LastPass vault cracking in 2025.</content:encoded><category>cloud</category><breach:sourceUrl>https://blog.lastpass.com/posts/notice-of-recent-security-incident</breach:sourceUrl><breach:dateOfBreach>2022-08-08</breach:dateOfBreach><breach:dateOfDisclosure>2022-11-30</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-12-22</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-1232: Improper Lock of Memory That Contains Resource (developer laptop compromise via malware; second stage via vulnerable Plex Media Server CVE-2020-5741)</breach:initialAttackVector><breach:cve>CVE-2020-5741</breach:cve><breach:vendorProduct>LastPass Password Manager</breach:vendorProduct><breach:softwarePackage>Plex Media Server</breach:softwarePackage><breach:cloudProvider>LastPass</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>0ktapus / Twilio Supply Chain Attack: LastPass, DoorDash, Okta, Authy (August 2022)</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_lastpass-doordash-okta-and-authy-twilio/</link><pubDate>Thu, 04 Aug 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_lastpass-doordash-okta-and-authy-twilio/</guid><description>On August 4, 2022, Twilio — a cloud communications platform used by thousands of businesses — confirmed
that attackers had breached its internal systems by sending SMS phishing messages to Twilio employees. The
texts impersonated Twilio's IT department, claiming that employee passwords had expired …</description><content:encoded><![CDATA[<p>On August 4, 2022, Twilio — a cloud communications platform used by thousands of businesses — confirmed
that attackers had breached its internal systems by sending SMS phishing messages to Twilio employees. The
texts impersonated Twilio&rsquo;s IT department, claiming that employee passwords had expired and directing
recipients to a spoofed Twilio login page that harvested credentials and multi-factor authentication codes
in real time. At least a few Twilio employees fell for the messages, giving attackers authenticated access
to Twilio&rsquo;s internal customer support systems.</p>
<p>The attack was part of a coordinated campaign dubbed &ldquo;0ktapus&rdquo; (also tracked as &ldquo;Scatter Swine&rdquo;) by
Group-IB researchers. The campaign ultimately compromised more than 130 organizations by phishing Okta
single-sign-on credentials and MFA codes, then using those credentials to pivot into downstream targets.
Across the full 0ktapus campaign, attackers harvested approximately 9,931 user credentials and 5,441 MFA
codes, all exfiltrated to a Telegram-based command channel.</p>
<p>Twilio disclosed that 209 customer accounts and 93 Authy end-user accounts were directly compromised.
The downstream impact spread quickly:</p>
<ul>
<li>
<p>Okta: Twilio&rsquo;s access to its customer support console allowed attackers to access phone numbers and
OTPs belonging to Okta customers. Okta later disclosed it was among the 163 Twilio customers whose
data was exposed. Okta attributed the same threat actor to a separate campaign it called &ldquo;Scatter Swine.&rdquo;</p>
</li>
<li>
<p>Signal: Twilio provided phone-number verification (SMS OTP delivery) for Signal. During the window
of unauthorized access, attackers could see Signal users&rsquo; phone numbers and potentially redirect
SMS verification codes. Approximately 1,900 Signal user phone numbers were exposed (covered in a
separate record).</p>
</li>
<li>
<p>Authy: Twilio&rsquo;s two-factor authentication app Authy had 93 end-user accounts accessed, with
attackers able to register additional devices to those accounts and intercept future OTP codes.</p>
</li>
<li>
<p>DoorDash: Attackers used credentials obtained via a Twilio-connected vendor to access DoorDash&rsquo;s
internal systems, exposing names, email addresses, delivery addresses, phone numbers, partial payment
card data, and order history for a subset of customers and delivery workers.</p>
</li>
<li>
<p>LastPass: LastPass confirmed it detected unusual activity originating from a third-party vendor
(later confirmed to be Twilio-connected infrastructure) that accessed its developer environment.
While no customer vault data was taken in this initial August event, it was the first intrusion
in a two-stage attack that ultimately led to the major LastPass vault-data theft in November 2022.</p>
</li>
</ul>
<p>The 0ktapus campaign demonstrated how compromising a single telephony/identity infrastructure provider
could cascade across dozens of high-value downstream organizations simultaneously. Cloudflare also
received the same SMS phishing messages but avoided compromise because it had deployed hardware FIDO2
security keys for all employee authentication, making phished passwords and OTPs useless alone.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/twilio-hackers-hit-over-130-orgs-in-massive-okta-phishing-attack/</breach:sourceUrl><breach:dateOfBreach>2022-08-04</breach:dateOfBreach><breach:dateOfDisclosure>2022-08-08</breach:dateOfDisclosure><breach:initialAttackVector>SMS phishing (smishing) of employee credentials leading to downstream supply chain compromise</breach:initialAttackVector><breach:vendorProduct>Twilio</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>LastPass</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>DoorDash 0ktapus/Twilio Campaign Third-Party Vendor Breach</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_doordash-0ktapus-vendor/</link><pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_doordash-0ktapus-vendor/</guid><description>On August 25, 2022, DoorDash disclosed a data breach caused by a phishing attack against an employee of an unnamed third-party vendor with access to DoorDash's internal systems. The attack was attributed to the 0ktapus / Scattered Spider campaign — the same threat actor responsible for the Twilio, …</description><content:encoded>On August 25, 2022, DoorDash disclosed a data breach caused by a phishing attack against an employee of an unnamed third-party vendor with access to DoorDash&amp;rsquo;s internal systems. The attack was attributed to the 0ktapus / Scattered Spider campaign — the same threat actor responsible for the Twilio, Cloudflare, Signal, and Mailchimp breaches in August 2022. The attacker used SMS phishing (smishing) to steal the vendor employee&amp;rsquo;s credentials, then used those credentials to access DoorDash&amp;rsquo;s systems. Exposed data included: names, email addresses, delivery addresses, and phone numbers for some customers; names, phone numbers, email addresses, and delivery addresses for some Dashers (delivery workers); and partial payment card information (card type and last four digits) for some customers. A smaller subset of Dashers and merchants had full payment card numbers and bank account numbers exposed. DoorDash stated no passwords, government IDs, or Social Security numbers were accessed. Part of the 0ktapus campaign that targeted 130+ organizations; see also 2022-08_twilio-0ktapus.yaml.</content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2022/08/25/doordash-data-breach-smishing/</breach:sourceUrl><breach:dateOfBreach>2022-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-08-25</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-08-25</breach:dateOfCustomerNotification><breach:initialAttackVector>0ktapus / Scattered Spider threat actors phished an employee of an unnamed third-party vendor with access to DoorDash systems via SMS phishing (smishing), then used the stolen credentials to access DoorDash's internal tools and customer data</breach:initialAttackVector><breach:cloudProvider>Twilio</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Mailchimp Social Engineering Breach — 133 Customers Affected Including Trezor, Fanatics, WooCommerce</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_digitalocean-edge-messari-decrypt-mailchimp/</link><pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_digitalocean-edge-messari-decrypt-mailchimp/</guid><description>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp's internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 …</description><content:encoded>In April 2022, Mailchimp discovered that a malicious actor had conducted a social engineering attack on Mailchimp employees and contractors, gaining access to Mailchimp&amp;rsquo;s internal admin tool. The attackers used the access to view data from 319 Mailchimp accounts and export audience data from 102 accounts. Affected accounts included crypto-related businesses (Trezor hardware wallet — whose subscriber list was used to send phishing emails to Trezor customers), sports merchandise retailer Fanatics, WooCommerce, and others. The Trezor incident had significant downstream impact: attackers sent phishing emails to Trezor customers claiming a security breach and directing them to a fake Trezor site to enter their seed phrases — a direct attempt to steal cryptocurrency funds. Mailchimp disclosed the breach on 4 April 2022. A second Mailchimp social engineering breach occurred in August 2022, affecting DigitalOcean and others. A third breach occurred in January 2023, affecting 133 accounts. The repeated breaches at Mailchimp highlighted the difficulty of protecting SaaS platforms against social engineering targeting internal support staff who necessarily have access to customer data.</content:encoded><category>cloud</category><breach:sourceUrl>https://mailchimp.com/newsroom/important-update-about-mailchimp-security/</breach:sourceUrl><breach:dateOfBreach>2022-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-08-01</breach:dateOfDisclosure><breach:initialAttackVector>Attackers used social engineering to target Mailchimp customer-facing operations staff, obtaining credentials to access internal tools used by Mailchimp's customer support and account administration teams; the attackers then used this access to view and export customer list data</breach:initialAttackVector><breach:vendorProduct>Mailchimp email marketing platform (internal admin tools)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Mailchimp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Signal Third-Party Breach (August 2022)</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_signal-twilio/</link><pubDate>Mon, 01 Aug 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_signal-twilio/</guid><description>Twilio hack exposed Signal phone numbers of 1,900 users. Phone numbers of close to 1,900 Signal users were exposed in the data breach Twilio cloud communications company suffered at the beginning of the month. Twilio provides phone number verification services for Signal and last week disclosed that …</description><content:encoded>Twilio hack exposed Signal phone numbers of 1,900 users. Phone numbers of close to 1,900 Signal users were exposed in the data breach Twilio cloud communications company suffered at the beginning of the month. Twilio provides phone number verification services for Signal and last week disclosed that an attacker hacked its network on August 4. The communications company confirmed that data belonging to 125 of its customers was exposed after the hackers gained access to Twilio employee accounts by sending them text messages with malicious links. Third-party company: Twilio.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/twilio-hack-exposed-signal-phone-numbers-of-1-900-users/</breach:sourceUrl><breach:dateOfBreach>2022-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-08-15</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Twilio</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Twilio</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>TechCrunch / The Register / Group-IB (0ktapus research)</title><link>https://breachnotes.vulnetix.com/cloud/2022-08_twilio-0ktapus/</link><pubDate>Wed, 01 Jun 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-08_twilio-0ktapus/</guid><description>Twilio employees received smishing SMS impersonating IT dept claiming password expiry. Employees entered credentials on fake Twilio login page with real-time MFA relay bypassing TOTP. 209 Twilio customers and 93 Authy users affected. Part of larger '0ktapus' campaign hitting 130+ organizations …</description><content:encoded>Twilio employees received smishing SMS impersonating IT dept claiming password expiry. Employees entered credentials on fake Twilio login page with real-time MFA relay bypassing TOTP. 209 Twilio customers and 93 Authy users affected. Part of larger &amp;lsquo;0ktapus&amp;rsquo; campaign hitting 130+ organizations including Cloudflare, DoorDash, Signal (via Twilio). Attackers had sophisticated employee phone-to-name matching. Also revealed Twilio was breached earlier in June 2022 via same method.</content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2022/08/08/twilio-breach-customer-data/</breach:sourceUrl><breach:dateOfBreach>2022-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-08-07</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-08-11</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-1021: Improper Restriction of Rendered UI Layers (SMS phishing / smishing with real-time OTP relay to fake login page)</breach:initialAttackVector><breach:vendorProduct>Twilio Communications Platform</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Twilio</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Heroku / Travis CI OAuth Token Theft — GitHub Private Repositories Exposed</title><link>https://breachnotes.vulnetix.com/cloud/2022-04_heroku-travis-oauth-token-theft/</link><pubDate>Thu, 07 Apr 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-04_heroku-travis-oauth-token-theft/</guid><description>In April 2022, GitHub detected that an attacker had used stolen OAuth user tokens issued to third-party integrations — specifically Heroku Dashboard (OAuth app ID 145909) and Travis CI (OAuth app IDs 9216 and 8230) — to download data from private GitHub repositories. The tokens had been stolen from …</description><content:encoded><![CDATA[In April 2022, GitHub detected that an attacker had used stolen OAuth user tokens issued to third-party integrations — specifically Heroku Dashboard (OAuth app ID 145909) and Travis CI (OAuth app IDs 9216 and 8230) — to download data from private GitHub repositories. The tokens had been stolen from Heroku&rsquo;s and Travis CI&rsquo;s systems without their knowledge. GitHub notified Heroku and Travis CI on 12 April 2022. The attacker used access to private repositories to search for credentials, secrets, and API keys stored in code, then used those credentials to access downstream services including NPM&rsquo;s infrastructure. NPM is owned by GitHub parent company Microsoft. The NPM breach allowed access to NPM&rsquo;s AWS environment and production databases. GitHub discovered the attack when it detected anomalous API activity. NPM confirmed that some NPM private package manifests and the associated private packages were downloaded by the attacker. GitHub revoked all OAuth tokens issued to Heroku and Travis CI integrations globally, breaking integrations for thousands of developers and organizations. Heroku subsequently announced it would permanently discontinue its GitHub integration. Travis CI — already struggling commercially — further declined after the incident. The attack demonstrated how OAuth delegation chains create supply chain risk: compromise of one OAuth application can expose all customer repositories that granted it access.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://github.blog/2022-04-15-security-alert-stolen-oauth-user-tokens/</breach:sourceUrl><breach:dateOfBreach>2022-04-07</breach:dateOfBreach><breach:dateOfDisclosure>2022-04-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-04-15</breach:dateOfCustomerNotification><breach:initialAttackVector>An attacker obtained stolen OAuth user tokens issued to Heroku and Travis CI (two third-party GitHub integrations); used the tokens to enumerate and download private GitHub repositories for organizations that had granted these integrations OAuth access; then used credentials found in those repositories to access downstream systems</breach:initialAttackVector><breach:vendorProduct>GitHub OAuth / Heroku integration / Travis CI integration</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Heroku</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Okta Third-Party Breach (March 2022)</title><link>https://breachnotes.vulnetix.com/cloud/2022-03_okta-sykes-enterprises/</link><pubDate>Tue, 01 Mar 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-03_okta-sykes-enterprises/</guid><description>Third-party company: Sykes Enterprises.</description><content:encoded>Third-party company: Sykes Enterprises.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.forbes.com/sites/thomasbrewster/2022/03/22/fury-as-okta-the-company-that-manages-100-million-logins-fails-to-tell-customers-about-breach-for-months/?sh=486c12468734</breach:sourceUrl><breach:dateOfBreach>2022-03-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-03-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Sykes Enterprises</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Okta / Critical Start / Hunters Security</title><link>https://breachnotes.vulnetix.com/cloud/2022-01_okta-lapsus/</link><pubDate>Sun, 16 Jan 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-01_okta-lapsus/</guid><description>Lapsus$ accessed Okta's network via compromised Sitel/Sykes contractor support workstation starting Jan 16 2022. Attacker used RDP lateral movement, accessed DomAdmins-LastPass.xlsx via Office 365, used Mimikatz, Sysinternals tools. Gained potential access to 366 Okta customers. Okta's public …</description><content:encoded>Lapsus$ accessed Okta&amp;rsquo;s network via compromised Sitel/Sykes contractor support workstation starting Jan 16 2022. Attacker used RDP lateral movement, accessed DomAdmins-LastPass.xlsx via Office 365, used Mimikatz, Sysinternals tools. Gained potential access to 366 Okta customers. Okta&amp;rsquo;s public disclosure was delayed ~2 months until Lapsus$ posted screenshots March 22 2022. Impacted customers included Cloudflare and Twilio.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.criticalstart.com/okta-breach-%E2%80%93-lapsus-hacker-group</breach:sourceUrl><breach:dateOfBreach>2022-01-16</breach:dateOfBreach><breach:dateOfDisclosure>2022-03-22</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-03-22</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-1391: Use of Weak Credentials (third-party support contractor workstation compromise via RDP + credential harvesting)</breach:initialAttackVector><breach:vendorProduct>Okta Identity Platform</breach:vendorProduct><breach:malware>Mimikatz</breach:malware><breach:cloudProvider>Okta</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Football Australia AWS S3 Bucket IAM Credential Exposure</title><link>https://breachnotes.vulnetix.com/cloud/2022-10_football-australia-aws-s3-keys/</link><pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-10_football-australia-aws-s3-keys/</guid><description>Football Australia, the governing body for association football (soccer) in Australia, suffered a data breach when AWS IAM credentials were exposed in a misconfigured Amazon S3 bucket. The exposed access key was an IAM user key (not a temporary role credential), providing persistent access. …</description><content:encoded>Football Australia, the governing body for association football (soccer) in Australia, suffered a data breach when AWS IAM credentials were exposed in a misconfigured Amazon S3 bucket. The exposed access key was an IAM user key (not a temporary role credential), providing persistent access. Researchers who discovered the issue in late 2022 found the bucket contained AWS credentials, private keys, and backend source code alongside a cache of player and fan registration data. Exposed personal data included names, email addresses, physical addresses, phone numbers, and dates of birth for both registered players and football fans. The incident was part of a broader pattern of AWS credential mismanagement in Australian sports organizations and was investigated by the Office of the Australian Information Commissioner (OAIC).</content:encoded><category>cloud</category><breach:sourceUrl>https://www.abc.net.au/news/2022-11-15/football-australia-data-breach-football-fans/101653252</breach:sourceUrl><breach:dateOfBreach>2022-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-11-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2022-11-15</breach:dateOfCustomerNotification><breach:initialAttackVector>An AWS IAM access key was inadvertently exposed in a publicly accessible Football Australia S3 bucket, enabling unauthorized access to backend systems and customer data spanning football players and fans</breach:initialAttackVector><breach:vendorProduct>Amazon S3; Amazon Web Services (IAM)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Pegasus Airlines AWS S3 Bucket Exposure — 6.5TB Flight Records, Source Code, Crew Data</title><link>https://breachnotes.vulnetix.com/cloud/2022-01_pegasus-airlines-s3-65tb/</link><pubDate>Sat, 01 Jan 2022 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-01_pegasus-airlines-s3-65tb/</guid><description>In early 2022, SafetyDetectives researchers discovered a publicly accessible Amazon S3 bucket belonging to Pegasus Airlines — a major Turkish airline with approximately 74 million passengers per year — that contained approximately 6.5 terabytes of data. The exposed data included: Electronic Flight …</description><content:encoded>In early 2022, SafetyDetectives researchers discovered a publicly accessible Amazon S3 bucket belonging to Pegasus Airlines — a major Turkish airline with approximately 74 million passengers per year — that contained approximately 6.5 terabytes of data. The exposed data included: Electronic Flight Bag (EFB) software source code, flight logs, navigation charts, insurance documents, crew personal information (names, addresses, passport numbers, employment details), and numerous operational files. The bucket contained approximately 23 million files. The exposure was particularly sensitive because it included crew member personal identification documents (passports) and operational aviation data that could potentially be used to understand flight operations. SafetyDetectives responsibly disclosed the findings to Pegasus Airlines, which was identified from the S3 bucket naming convention. This exposure occurred while Pegasus Airlines was already dealing with a separate data breach from a 2020 incident. The case demonstrated the persistent risk of misconfigured cloud storage at major transportation companies handling highly sensitive operational data. Aviation data exposures carry particular regulatory weight under IATA and ICAO data security standards. Pegasus secured the bucket after notification.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.verizon.com/business/resources/reports/dbir/</breach:sourceUrl><breach:dateOfBreach>2022-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2022-03-30</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured publicly accessible Amazon S3 bucket containing Pegasus Airlines' Electronic Flight Bag (EFB) software — airline operational data systems — was discovered by SafetyDetectives researchers; the bucket required no authentication to access</breach:initialAttackVector><breach:vendorProduct>Pegasus Airlines AWS S3 bucket (Electronic Flight Bag / EFB data)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Twitch Source Code and Internal Data Leak — 125GB Anonymous Dump</title><link>https://breachnotes.vulnetix.com/cloud/2021-10_twitch-source-code-leak/</link><pubDate>Wed, 06 Oct 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-10_twitch-source-code-leak/</guid><description>On 6 October 2021, an anonymous actor posted a 125 GB torrent on 4chan containing Twitch's entire source code, internal security tools, mobile and desktop clients, proprietary SDKs, internal AWS services, an unreleased Steam competitor codenamed 'Vapor', creator payout data for the top 10,000 Twitch …</description><content:encoded><![CDATA[On 6 October 2021, an anonymous actor posted a 125 GB torrent on 4chan containing Twitch&rsquo;s entire source code, internal security tools, mobile and desktop clients, proprietary SDKs, internal AWS services, an unreleased Steam competitor codenamed &lsquo;Vapor&rsquo;, creator payout data for the top 10,000 Twitch streamers (dating back to 2019), and internal red team tools. The actor claimed to have released the data to &lsquo;foster more disruption and competition in the online video streaming space&rsquo; and described it as &lsquo;part one&rsquo;, suggesting more data would follow. Twitch confirmed the breach on 6 October and stated that it was caused by &lsquo;an error in a Twitch server configuration change that was subsequently accessed by a malicious third party.&rsquo; The exposed creator payout data included names and dollar amounts paid to streamers, with several top streamers earning over $5 million in the 26-month period captured. Critically, Twitch stated that full credit card numbers were not exposed, and that their systems that stored these were not accessed. AWS credentials were exposed in the dump, raising supply chain risks for downstream services. A second torrent was never published. The incident significantly impacted creator trust on the platform and highlighted risks of centralised source code repository access controls.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://blog.twitch.tv/en/2021/10/15/updates-on-the-twitch-security-incident/</breach:sourceUrl><breach:dateOfBreach>2021-10-06</breach:dateOfBreach><breach:dateOfDisclosure>2021-10-06</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-10-15</breach:dateOfCustomerNotification><breach:initialAttackVector>Anonymous actor (posting as 'Anonymous' on 4chan) claimed a server misconfiguration allowed access to Twitch's internal Git repositories; the attacker obtained credentials or tokens that granted access to Twitch's internal infrastructure</breach:initialAttackVector><breach:vendorProduct>Twitch (Amazon subsidiary) internal Git / source code infrastructure</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Twitch Source Code and Creator Payout Leak — 125GB via Anonymous 4chan Post</title><link>https://breachnotes.vulnetix.com/cloud/2021-10_twitch-source-code-125gb-leak/</link><pubDate>Mon, 04 Oct 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-10_twitch-source-code-125gb-leak/</guid><description>On October 6, 2021, an anonymous user posted a 125GB torrent to 4chan claiming it was a complete Twitch data dump intended to 'foster more disruption and competition in the online video streaming space.' The leak included: Twitch's entire source code going back years; creator payout data showing the …</description><content:encoded><![CDATA[On October 6, 2021, an anonymous user posted a 125GB torrent to 4chan claiming it was a complete Twitch data dump intended to &lsquo;foster more disruption and competition in the online video streaming space.&rsquo; The leak included: Twitch&rsquo;s entire source code going back years; creator payout data showing the earnings of approximately 10,000 top Twitch streamers (the most viral element, revealing that top streamers earned millions annually); internal security tools; proprietary SDKs and AWS services used internally; the unreleased Amazon Game Studios title &lsquo;Vapor&rsquo; (a Steam competitor); and internal tools and red-teaming documents. Notably, hashed user passwords and full credit card numbers were reportedly not included. Twitch confirmed the breach was real and attributed it to a server misconfiguration. The creator payout data was particularly controversial as it publicly revealed the financial earnings of Twitch streamers for the first time, affecting thousands of content creators who had kept their income private. Twitch (owned by Amazon) reset all stream keys as a precaution. The anonymous poster stated the 125GB was &lsquo;part one,&rsquo; suggesting more data might be released. No subsequent major release occurred. The motivation appeared ideological rather than financial — the poster called Twitch a &lsquo;disgusting cesspool&rsquo; and wanted to harm the platform. No individual was publicly identified or charged in connection with the breach.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.theverge.com/2021/10/6/22712573/twitch-hack-data-source-code-creator-payout-breach</breach:sourceUrl><breach:dateOfBreach>2021-10-04</breach:dateOfBreach><breach:dateOfDisclosure>2021-10-06</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-10-06</breach:dateOfCustomerNotification><breach:initialAttackVector>Server misconfiguration — Twitch stated the data was exposed due to an error in a Twitch server configuration change; the specific nature of the misconfiguration was not detailed, but the attacker accessed and exfiltrated data from Twitch's internal Git repositories and infrastructure</breach:initialAttackVector><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Microsoft Azure ChaosDB Cosmos DB Vulnerability — All Azure Customers at Risk</title><link>https://breachnotes.vulnetix.com/cloud/2021-08_azure-cosmos-db-chaosdb/</link><pubDate>Mon, 09 Aug 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-08_azure-cosmos-db-chaosdb/</guid><description>On 9 August 2021, Wiz.io security researchers discovered a critical vulnerability chain in Microsoft Azure Cosmos DB — Microsoft's flagship globally distributed database service used by thousands of major companies. The researchers called it 'ChaosDB.' The vulnerability chain exploited a feature …</description><content:encoded><![CDATA[On 9 August 2021, Wiz.io security researchers discovered a critical vulnerability chain in Microsoft Azure Cosmos DB — Microsoft&rsquo;s flagship globally distributed database service used by thousands of major companies. The researchers called it &lsquo;ChaosDB.&rsquo; The vulnerability chain exploited a feature called Jupyter Notebook integrated into Cosmos DB, which allowed privilege escalation to gain access to other customers&rsquo; Cosmos DB primary keys, database contents, and connection strings — with no action required by the victim. An attacker with a Cosmos DB account could potentially access any other customer&rsquo;s data. Microsoft was notified on 9 August 2021 and disabled the Jupyter Notebook feature within 48 hours. Microsoft sent notifications on 26 August 2021 to approximately 3,300 Azure customers whose primary keys may have been accessible — though the researchers noted the vulnerability had existed since at least 2019 and potentially could have been exploited by anyone with an Azure account during that two-year period. Microsoft offered a $40,000 bug bounty for the discovery. Microsoft stated it found no evidence that external parties had discovered or exploited the vulnerability. The case highlighted the severity of cloud provider vulnerabilities — where a single flaw in a shared platform can potentially expose all customers simultaneously — and the difficulty for customers to detect or prevent such exposures.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough</breach:sourceUrl><breach:dateOfBreach>2021-08-09</breach:dateOfBreach><breach:dateOfDisclosure>2021-08-26</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-08-26</breach:dateOfCustomerNotification><breach:initialAttackVector>Wiz.io researchers discovered a chain of vulnerabilities in Azure Cosmos DB's Jupyter Notebook integration that allowed complete access to any Azure Cosmos DB customer's database — without any action required from the victim; the vulnerability enabled attackers to read, write, and delete data in Cosmos DB accounts belonging to any Azure customer</breach:initialAttackVector><breach:vendorProduct>Microsoft Azure Cosmos DB (globally distributed cloud database)</breach:vendorProduct><breach:cloudProvider>Azure</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>American Airlines, Ford, Maryland Department of Health, New York City Municipal Transportation Authority, and the state of Indiana. Third-Party Breach (August 2021)</title><link>https://breachnotes.vulnetix.com/cloud/2021-08_american-airlines-ford-maryland-depa-microsoft/</link><pubDate>Sun, 01 Aug 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-08_american-airlines-ford-maryland-depa-microsoft/</guid><description>Microsoft Data Breach Exposes 38M Records Containing PII | TechTarget. A Microsoft Power Apps data breach exposed 38M records containing PII and impacted 47 organizations, including some governmental public health agencies. A Microsoft Power Apps data breach exposed 38 million records containing …</description><content:encoded>Microsoft Data Breach Exposes 38M Records Containing PII | TechTarget. A Microsoft Power Apps data breach exposed 38M records containing PII and impacted 47 organizations, including some governmental public health agencies. A Microsoft Power Apps data breach exposed 38 million records containing personally identifiable information (PII), according to a report from cybersecurity company UpGuard. The data breach impacted 47 organizations across multiple industries, including some governmental public health agencies. On May 24, 2021, an UpGuard analyst discovered that the Open Data Protocols (OData) API for an organization’s Power Apps portal that contained an anonymously accessible list of data. The exposed PII included names, COVID-19 contact tracing information, vaccination appointments, Social Security numbers, employee IDs, and email addresses. Third-party company: Microsoft.</content:encoded><category>cloud</category><breach:sourceUrl>https://healthitsecurity.com/news/microsoft-data-breach-exposes-38m-records-containing-pii</breach:sourceUrl><breach:dateOfBreach>2021-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-08-24</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Microsoft</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Microsoft</breach:cloudProvider><breach:cloudSharedResponsibility>shared</breach:cloudSharedResponsibility></item><item><title>CISA / NCSC / Wikipedia / Varonis</title><link>https://breachnotes.vulnetix.com/cloud/2021-07_kaseya-vsa-revil/</link><pubDate>Fri, 02 Jul 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-07_kaseya-vsa-revil/</guid><description>REvil ransomware gang exploited zero-day SQL injection and auth bypass (CVE-2021-30116) in Kaseya VSA endpoint management software on July 4th weekend 2021. Delivered malicious auto-updates to MSPs who then pushed ransomware to downstream customers. 1500+ companies encrypted across 17 countries. …</description><content:encoded>REvil ransomware gang exploited zero-day SQL injection and auth bypass (CVE-2021-30116) in Kaseya VSA endpoint management software on July 4th weekend 2021. Delivered malicious auto-updates to MSPs who then pushed ransomware to downstream customers. 1500+ companies encrypted across 17 countries. Swedish Coop supermarket chain (800 stores closed), New Zealand kindergartens, Romanian public admin affected. $70M universal decryptor demanded (reduced to $50M). Yaroslav Vasinskyi arrested, convicted 2024, sentenced 13+ years.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.varonis.com/blog/revil-msp-supply-chain-attack</breach:sourceUrl><breach:dateOfBreach>2021-07-02</breach:dateOfBreach><breach:dateOfDisclosure>2021-07-02</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-07-03</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-89: SQL Injection in Kaseya VSA web interface (zero-day)</breach:initialAttackVector><breach:cve>CVE-2021-30116</breach:cve><breach:vendorProduct>Kaseya VSA</breach:vendorProduct><breach:softwarePackage>Kaseya VSA</breach:softwarePackage><breach:malware>REvil / Sodinokibi</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Kaseya</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Kaseya VSA REvil Supply Chain Ransomware — 1,500 Businesses, $70M Demand</title><link>https://breachnotes.vulnetix.com/cloud/2021-07_msps-and-clients-including-visma-ess-kaseya/</link><pubDate>Thu, 01 Jul 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-07_msps-and-clients-including-visma-ess-kaseya/</guid><description>See comprehensive record: data/supply-chain/2021-07_kaseya-vsa-revil.yaml. Kaseya VSA is used by MSPs (Managed Service Providers) to remotely manage client endpoints — a single Kaseya VSA server compromise simultaneously encrypted all managed endpoints across all of an MSP's clients. Approximately …</description><content:encoded>See comprehensive record: data/supply-chain/2021-07_kaseya-vsa-revil.yaml. Kaseya VSA is used by MSPs (Managed Service Providers) to remotely manage client endpoints — a single Kaseya VSA server compromise simultaneously encrypted all managed endpoints across all of an MSP&amp;rsquo;s clients. Approximately 1,500 businesses in 17 countries were encrypted in 2 hours. REvil demanded $70M for a universal decryptor.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/news-events/cybersecurity-advisories/aa21-200a</breach:sourceUrl><breach:dateOfBreach>2021-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-07-01</breach:dateOfDisclosure><breach:initialAttackVector>REvil exploited multiple zero-day vulnerabilities in Kaseya VSA (CVE-2021-30116, CVE-2021-30119, CVE-2021-30120) to push malicious script execution to all managed endpoints without authentication; exploitation was conducted over the Independence Day holiday weekend</breach:initialAttackVector><breach:vendorProduct>Kaseya VSA remote monitoring and management (RMM) platform</breach:vendorProduct><breach:malware>REvil (Sodinokibi) ransomware</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Kaseya</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>UNC2903 IMDSv1 AWS Instance Metadata Service Abuse</title><link>https://breachnotes.vulnetix.com/cloud/2022-06_unc2903-imdsv1-aws-metadata/</link><pubDate>Mon, 21 Jun 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2022-06_unc2903-imdsv1-aws-metadata/</guid><description>UNC2903 is a financially-motivated threat actor tracked by Mandiant/Google Cloud that systematically exploited IMDSv1 vulnerabilities in AWS deployments. Beginning in mid-2021, UNC2903 scanned for and exploited web applications with SSRF vulnerabilities to reach the AWS EC2 Instance Metadata Service …</description><content:encoded>UNC2903 is a financially-motivated threat actor tracked by Mandiant/Google Cloud that systematically exploited IMDSv1 vulnerabilities in AWS deployments. Beginning in mid-2021, UNC2903 scanned for and exploited web applications with SSRF vulnerabilities to reach the AWS EC2 Instance Metadata Service v1 endpoint (169.254.169.254), which returns temporary IAM role credentials without requiring any authentication. These credentials were then used to access S3 buckets and other AWS services. IMDSv1 by design provides credentials to anyone who can reach the metadata endpoint, including through SSRF. AWS subsequently made IMDSv2 (which requires a session token obtained via PUT request, preventing SSRF exploitation) the default for new instances. This campaign was disclosed in Google Cloud&amp;rsquo;s threat intelligence report in May 2022 and is a canonical example of the SSRF-to-cloud-credentials attack chain.</content:encoded><category>cloud</category><breach:sourceUrl>https://cloud.google.com/blog/topics/threat-intelligence/cloud-metadata-server-ssrf-exploitation</breach:sourceUrl><breach:dateOfBreach>2021-06-21</breach:dateOfBreach><breach:dateOfDisclosure>2022-05-04</breach:dateOfDisclosure><breach:initialAttackVector>UNC2903 exploited Server-Side Request Forgery (SSRF) vulnerabilities in web applications running on AWS EC2 instances to query the IMDSv1 (Instance Metadata Service v1) endpoint at 169.254.169.254, retrieving temporary IAM role credentials without authentication</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services EC2 IMDSv1 (Instance Metadata Service v1)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:ec2:{region}:{account}:instance/{id}</breach:cloudResourceCrit></item><item><title>Fasttrack Customers Third-Party Breach (May 2021)</title><link>https://breachnotes.vulnetix.com/cloud/2021-05_fasttrack-customers-fasttrack-recruitment/</link><pubDate>Sat, 01 May 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-05_fasttrack-customers-fasttrack-recruitment/</guid><description>A UK recruitment firm exposed sensitive applicants data for months. FastTrack Reflex Recruitment firm recently joined the ranks of other companies that have been affected by data leaks due to misconfigured AWS S3 buckets . This data breach majorly affected the applicants whose CVs containing …</description><content:encoded>A UK recruitment firm exposed sensitive applicants data for months. FastTrack Reflex Recruitment firm recently joined the ranks of other companies that have been affected by data leaks due to misconfigured AWS S3 buckets . This data breach majorly affected the applicants whose CVs containing personal information were leaked, reports the research team at Website Planet. Attached to numerous CVs were the personal IDs of applicants, including passports, citizen ID cards, driver’s licenses, and skilled worker IDs. All of these constitute direct and indirect applicant PII. Examples of directly identifiable PII include the following:. It is worth noting that the configuration of the server is not the responsibility of Amazon but rather the company, FastTrack, that is using it as a public cloud storage resource. Third-party company: Fasttrack Recruitment.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.hackread.com/uk-recruitment-firm-exposed-applicants-data/</breach:sourceUrl><breach:dateOfBreach>2021-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-05-20</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Fasttrack Recruitment</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Microsoft Power Apps Portals Misconfiguration — 38 Million Records Exposed from 47 Organizations</title><link>https://breachnotes.vulnetix.com/cloud/2021-08_microsoft-power-apps-misconfiguration/</link><pubDate>Sat, 01 May 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-08_microsoft-power-apps-misconfiguration/</guid><description>Security researchers at Upguard and Wiz.io discovered in mid-2021 that Microsoft Power Apps portals had a default configuration that left internal data tables publicly accessible on the internet. Across 47 organisations — including American Airlines, Ford Motor Company, JB Hunt, the New York City …</description><content:encoded>Security researchers at Upguard and Wiz.io discovered in mid-2021 that Microsoft Power Apps portals had a default configuration that left internal data tables publicly accessible on the internet. Across 47 organisations — including American Airlines, Ford Motor Company, JB Hunt, the New York City Municipal Transportation Authority, the New York City Department of Education, Indiana&amp;rsquo;s state government, and various COVID-19 contact tracing programs — approximately 38 million records were exposed. Exposed data included COVID-19 vaccination status and contact tracing data, employee information, Social Security numbers, PII from job applications, and government benefit eligibility data. Microsoft was notified by UpGuard in late June 2021 and initially considered the exposures to be customer misconfigurations rather than a platform vulnerability. After pressure from security researchers and media attention, Microsoft changed the default setting to &amp;lsquo;private&amp;rsquo; in August 2021 and added a new tool to help administrators identify and secure exposed tables. The incident highlighted how low-code/no-code platform defaults can create large-scale unintentional data exposures affecting multiple organizations sharing a common platform.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.wiz.io/blog/2021/08/31/power-apps-data-exposure</breach:sourceUrl><breach:dateOfBreach>2021-05-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-08-23</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-08-23</breach:dateOfCustomerNotification><breach:initialAttackVector>Microsoft Power Apps portals defaulted to allowing public table access; organizations inadvertently exposed internal databases containing PII because Microsoft's default configuration required administrators to explicitly disable public access — a non-intuitive security posture that many missed</breach:initialAttackVector><breach:vendorProduct>Microsoft Power Apps Portals (low-code platform)</breach:vendorProduct><breach:cloudProvider>Microsoft</breach:cloudProvider><breach:cloudSharedResponsibility>shared</breach:cloudSharedResponsibility></item><item><title>Click Studios Passwordstate Supply Chain Attack — Malicious Update, 29,000 Companies</title><link>https://breachnotes.vulnetix.com/cloud/2021-04_click-studios-customers-click-studios/</link><pubDate>Tue, 20 Apr 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-04_click-studios-customers-click-studios/</guid><description>Click Studios, the Australian developer of the enterprise password manager Passwordstate, suffered a supply chain compromise between April 20–22, 2021 (a 28-hour window). Attackers breached Click Studios' infrastructure and redirected the application's In-Place Upgrade functionality to a …</description><content:encoded><![CDATA[<p>Click Studios, the Australian developer of the enterprise password manager Passwordstate, suffered a supply chain compromise between April 20–22, 2021 (a 28-hour window). Attackers breached Click Studios&rsquo; infrastructure and redirected the application&rsquo;s In-Place Upgrade functionality to a threat-actor-controlled CDN, causing any customer who triggered an update during that window to silently receive a malicious DLL alongside the legitimate update package.</p>
<p>The malware payload, dubbed Moserpass by CSIS Security Group (which discovered the attack), collected and exfiltrated a broad set of sensitive data to attacker-controlled servers: computer name, username, domain name, current process name and ID, as well as all credential fields stored in Passwordstate vaults — title, username, description, notes, URL, and plaintext password. The harvested credentials were transmitted to a hardcoded C2 endpoint using HTTP POST requests.</p>
<p>Passwordstate is used by over 370,000 security and IT professionals at approximately 29,000 organizations worldwide, spanning government, defense, finance, aerospace, retail, automotive, healthcare, legal, and media sectors. Click Studios issued an emergency advisory on April 24 urging all customers who had performed an In-Place Upgrade to immediately reset every password stored in the vault. The company published a hotfix on April 24 and removed the compromised upgrade mechanism entirely in a longer-term remediation released August 2, 2021.</p>
<p>The attack bore structural similarities to SolarWinds SUNBURST: legitimate software update infrastructure was weaponized to reach deeply embedded enterprise users, and the payload was designed to harvest the most sensitive possible data — stored credentials — rather than deliver ransomware or destructive malware. Attribution was not publicly confirmed. Customers complained for months about insufficient transparency, as Click Studios declined to publicly disclose how many customers had been impacted or which specific organizations had received the malicious update.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/passwordstate-password-manager-hacked-in-supply-chain-attack/</breach:sourceUrl><breach:dateOfBreach>2021-04-20</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-24</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-04-24</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-506: Embedded Malicious Code — attackers hijacked Passwordstate's In-Place Upgrade CDN endpoint to serve trojanized update containing Moserpass infostealer</breach:initialAttackVector><breach:vendorProduct>Click Studios Passwordstate</breach:vendorProduct><breach:softwarePackage>Passwordstate</breach:softwarePackage><breach:malware>Moserpass</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Passwordstate</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Atlassian, Procter &amp; Gamble, GoDaddy, The Washington Post Third-Party Breach (April 2021)</title><link>https://breachnotes.vulnetix.com/cloud/2021-04_atlassian-procter-gamble-godaddy-the-washington-post-codecov/</link><pubDate>Thu, 01 Apr 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-04_atlassian-procter-gamble-godaddy-the-washington-post-codecov/</guid><description>US investigators probing breach at code testing vendor. [](https://www.linkedin.com/company/itnews "follow us on Linkedin")[](https://twitter.com/itnews_au "follow us on X")[](https://www.facebook.com/iTnewsAustralia "follow us on …</description><content:encoded><![CDATA[US investigators probing breach at code testing vendor. <a href="https://www.linkedin.com/company/itnews" title="follow us on Linkedin"></a><a href="https://twitter.com/itnews_au" title="follow us on X"></a><a href="https://www.facebook.com/iTnewsAustralia" title="follow us on Facebook"></a><a href="https://news.google.com/publications/CAAqKAgKIiJDQklTRXdnTWFnOEtEV2wwYm1WM2N5NWpiMjB1WVhVb0FBUAE" title="follow google news"></a><a href="https://whatsapp.com/channel/0029VbBQ4EHB4hdYliwNnX3p" title="follow us on WhatsApp"></a><a href="http://www.itnews.com.au/rss" title="RSS feeds"></a>. <a href="https://twitter.com/itnews_au" title="follow us on X"></a><a href="https://www.facebook.com/iTnewsAustralia" title="follow us on Facebook"></a><a href="https://www.linkedin.com/company/itnews" title="follow us on Linkedin"></a><a href="http://www.itnews.com.au/rss" title="RSS feeds"></a>. LOG INSUBSCRIBE<a href="http://www.itnews.com.au/news/us-investigators-probing-breach-at-code-testing-vendor-563505#"></a>. Third-party company: CodeCov.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.itnews.com.au/news/us-investigators-probing-breach-at-code-testing-vendor-563505</breach:sourceUrl><breach:dateOfBreach>2021-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>CodeCov</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Codecov</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Verkada Security Camera Network Breach: 150,000 Live Feeds Exposed</title><link>https://breachnotes.vulnetix.com/cloud/2021-03_verkada-cameras-jenkins-credentials/</link><pubDate>Mon, 08 Mar 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-03_verkada-cameras-jenkins-credentials/</guid><description>In March 2021, a collective including Swiss hacker Tillie Kottmann ('deletescape') gained access to Verkada's global security camera management platform by discovering Verkada 'Super Admin' credentials exposed in a Jenkins CI/CD server. Using these credentials, the attackers gained root-level access …</description><content:encoded><![CDATA[In March 2021, a collective including Swiss hacker Tillie Kottmann (&lsquo;deletescape&rsquo;) gained access to Verkada&rsquo;s global security camera management platform by discovering Verkada &lsquo;Super Admin&rsquo; credentials exposed in a Jenkins CI/CD server. Using these credentials, the attackers gained root-level access to approximately 150,000 cameras across Verkada&rsquo;s enterprise customers. Live camera feeds were accessed at Tesla manufacturing facilities, Cloudflare offices, Equinox gyms, Sandy Hook Elementary School, Halifax Health hospital, Madison County Jail, and Tempe Police Department. The attackers also scraped Verkada&rsquo;s customer list. Kottmann stated the breach was conducted &lsquo;for the lulz and the profit&rsquo; and to highlight how widespread surveillance infrastructure is. Bloomberg published screenshots and videos from the accessed cameras, creating significant privacy and security concerns. Verkada disabled internal administrator accounts and notified customers. The US Department of Justice indicted Kottmann in March 2021 on charges unrelated to the Verkada breach; Swiss authorities arrested Kottmann in September 2021.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bloomberg.com/news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cameras</breach:sourceUrl><breach:dateOfBreach>2021-03-08</breach:dateOfBreach><breach:dateOfDisclosure>2021-03-09</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-03-09</breach:dateOfCustomerNotification><breach:initialAttackVector>Attackers (led by Swiss hacker Tillie Kottmann / 'deletescape') found 'Super Admin' credentials for Verkada's cloud video platform in a publicly accessible Jenkins server; used them to gain root access to all 150,000 cameras across thousands of Verkada's enterprise customers</breach:initialAttackVector><breach:vendorProduct>Verkada (cloud-managed security cameras)</breach:vendorProduct><breach:softwarePackage>Jenkins</breach:softwarePackage><breach:cloudProvider>Verkada</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Codecov Bash Uploader Supply Chain Attack — CI Token Theft, Rapid7/Twilio/Monday.com/Mercari Among Victims</title><link>https://breachnotes.vulnetix.com/cloud/2021-05_monday-com-rapid7-twilio-mercari-codecov/</link><pubDate>Sun, 31 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-05_monday-com-rapid7-twilio-mercari-codecov/</guid><description>Codecov, a widely used code coverage reporting service, suffered a sophisticated supply chain compromise that began January 31, 2021, and was not discovered until April 1, 2021 — giving attackers more than two months of undetected access. Attackers exploited a flaw in Codecov's Docker image build …</description><content:encoded><![CDATA[<p>Codecov, a widely used code coverage reporting service, suffered a sophisticated supply chain compromise that began January 31, 2021, and was not discovered until April 1, 2021 — giving attackers more than two months of undetected access. Attackers exploited a flaw in Codecov&rsquo;s Docker image build process that allowed them to extract credentials, which they then used to gain access to Codecov&rsquo;s GCS (Google Cloud Storage) bucket hosting the Bash Uploader script.</p>
<p>The attackers modified the Bash Uploader to append a malicious one-liner: a curl command that silently exfiltrated all CI/CD environment variables — including tokens, API keys, AWS keys, and any secret stored in the CI environment — to an attacker-controlled server (35.85.59[.]168). Because the Bash Uploader was executed inside thousands of CI pipelines on every code push, the attackers received a continuous stream of credentials across a wide range of organizations throughout the 2.5-month window.</p>
<p>The attack was structurally similar to the SolarWinds compromise: a trusted tool inserted into developers&rsquo; build pipelines became a universal collection mechanism. Codecov&rsquo;s post-mortem confirmed periodic unauthorized alterations to the script occurred across the window. The FBI and CISA investigated the incident.</p>
<p>Confirmed victims who publicly disclosed impact included: Rapid7 (source code repository access and a small number of internal credentials from their MDR tooling CI server); Twilio (GitHub repository credentials accessed); Monday.com (source code accessed via compromised tokens); Mercari (source code and internal credentials); HashiCorp (GPG signing key used for HashiCorp releases exposed, leading to key rotation); Confluent (source code exposed). Hundreds of additional organizations were reported affected but did not publicly disclose. The attackers appeared to prioritize targets with access to further high-value infrastructure rather than mass exploitation.</p>
<p>Codecov rotated all credentials, replaced the compromised Bash Uploader, and notified affected customers beginning April 15, 2021. The incident prompted widespread calls to remove curl-pipe-to-bash patterns from CI pipelines and to use integrity-verified, pinned script downloads.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/hundreds-of-networks-reportedly-hacked-in-codecov-supply-chain-attack/</breach:sourceUrl><breach:dateOfBreach>2021-01-31</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-04-15</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-506: Embedded Malicious Code — attackers exploited a Docker image build flaw in Codecov's CI pipeline to insert a credential-harvesting curl command into the Bash Uploader script</breach:initialAttackVector><breach:vendorProduct>Codecov Bash Uploader</breach:vendorProduct><breach:softwarePackage>codecov/codecov-action; bash uploader script</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Codecov</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Codecov Bash Uploader Supply Chain Attack — CircleCI, Twilio, Atlassian, Confluent Downstream</title><link>https://breachnotes.vulnetix.com/cloud/2021-01_codecov-bash-uploader/</link><pubDate>Sun, 31 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-01_codecov-bash-uploader/</guid><description>Between 31 January and 1 April 2021, attackers modified Codecov's popular bash uploader script — used by thousands of CI/CD pipelines to upload code coverage reports — to exfiltrate environment variables including credentials, tokens, and API keys from every CI/CD pipeline that used it. The tampered …</description><content:encoded>Between 31 January and 1 April 2021, attackers modified Codecov&amp;rsquo;s popular bash uploader script — used by thousands of CI/CD pipelines to upload code coverage reports — to exfiltrate environment variables including credentials, tokens, and API keys from every CI/CD pipeline that used it. The tampered script sent stolen data to an attacker-controlled server (opcode.io). Codecov discovered the compromise on 1 April 2021 and disclosed it on 15 April. The downstream impact was significant: Twilio confirmed their CI/CD environment was compromised; Atlassian confirmed exposure of credentials; HashiCorp&amp;rsquo;s Mercurial mirror deployment key was exposed; Snyk, The Washington Post, Shopify, and many others investigated impacts. Atlassian, Twilio, Hashicorp, Confluent, and Procore were among major confirmed victims. The FBI assisted Codecov in the investigation. The attack was notable because it silently ran in CI pipelines for over two months, affecting both open-source projects and private enterprise pipelines. The attacker used the stolen credentials to further breach downstream companies. The technique — compromising a widely-used CI tool to harvest secrets at scale — predated and inspired several subsequent supply chain attacks. The attack was attributed to a Winstar/GoldBacillus threat actor affiliated with Russian SVR (based on similar TTPs to APT29/Cozy Bear).</content:encoded><category>cloud</category><breach:sourceUrl>https://about.codecov.io/security-update/</breach:sourceUrl><breach:dateOfBreach>2021-01-31</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-04-15</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker exploited a flaw in Codecov's Docker image creation process that allowed extraction of credentials from Codecov's Google Cloud Storage bucket; used these to modify the bash uploader script distributed to CI/CD pipelines; the tampered script exfiltrated CI environment variables (secrets, tokens, keys) to attacker-controlled server</breach:initialAttackVector><breach:vendorProduct>Codecov Bash Uploader (codecov.io CI/CD coverage tool)</breach:vendorProduct><breach:softwarePackage>codecov-bash</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Codecov</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>20/20 Eye Care Network Breach — 3.25 Million Patients via AWS S3 Deletion</title><link>https://breachnotes.vulnetix.com/cloud/2021-01_2020-eye-care-network-3-25m/</link><pubDate>Mon, 11 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-01_2020-eye-care-network-3-25m/</guid><description>On 11 January 2021, 20/20 Eye Care Network — a managed vision care benefits company providing administration services to health plans — discovered that an unauthorized actor had accessed and deleted files stored in AWS S3 buckets containing member information. Because the attacker deleted the files …</description><content:encoded>On 11 January 2021, 20/20 Eye Care Network — a managed vision care benefits company providing administration services to health plans — discovered that an unauthorized actor had accessed and deleted files stored in AWS S3 buckets containing member information. Because the attacker deleted the files rather than simply copying them, 20/20 was unable to definitively determine whether data had been exfiltrated prior to deletion. 20/20 notified members as a precaution based on the access to the S3 environment. Approximately 3.25 million health plan members were affected. Exposed data included member IDs, names, dates of birth, addresses, Social Security numbers, and health insurance account information. 20/20 serves as a third-party administrator for vision benefits for multiple major health insurance plans. HHS OCR opened an investigation. Multiple class-action lawsuits were filed alleging inadequate security and breach notification failures. 20/20 Eye Care Network subsequently filed for bankruptcy in early 2021, making it one of the few cases where a healthcare data breach directly contributed to a company&amp;rsquo;s insolvency — joining American Medical Collection Agency (AMCA) in this rare category. The deletion of files rather than exfiltration represented an unusual attack pattern, possibly a ransomware-like extortion attempt or deliberate data destruction.</content:encoded><category>cloud</category><breach:sourceUrl>https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf</breach:sourceUrl><breach:dateOfBreach>2021-01-11</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-28</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-04-28</breach:dateOfCustomerNotification><breach:initialAttackVector>Unknown attacker gained access to 20/20 Eye Care Network's AWS environment and accessed and deleted files stored in S3 buckets containing member information; 20/20 discovered the deletion and was unable to determine whether data was exfiltrated prior to deletion</breach:initialAttackVector><breach:vendorProduct>20/20 Eye Care Network AWS S3 storage</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Facebook, Instagram, LinkedIn Third-Party Breach (January 2021)</title><link>https://breachnotes.vulnetix.com/cloud/2021-01_facebook-instagram-linkedin-socialark/</link><pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-01_facebook-instagram-linkedin-socialark/</guid><description>Chinese start-up leaked 400GB of scraped data exposing 200+ million Facebook, Instagram and LinkedIn users. High-flying and rapidly growing Chinese social media management company Socialarks has suffered a huge data leak leading to the exposure of over 400GB of person. The company’s unsecured …</description><content:encoded>Chinese start-up leaked 400GB of scraped data exposing 200+ million Facebook, Instagram and LinkedIn users. High-flying and rapidly growing Chinese social media management company Socialarks has suffered a huge data leak leading to the exposure of over 400GB of person. The company’s unsecured ElasticSearch database contained personally identifiable information (PII) from at least 214 million social media users from around the world, using both populist consumer platforms such as Facebook and Instagram, as well as professional networks such as LinkedIn. The Elastic instance was discovered as part of Safety Detectives’ cybersecurity mission of discovering online vulnerabilities that could potentially pose risks to the general public. Once the owner of the data is identified, our team then informs the affected parties as soon as possible to mitigate the risk of any cybersecurity breaches and server leaks. Third-party company: SocialArk.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.safetydetectives.com/blog/socialarks-leak-report/</breach:sourceUrl><breach:dateOfBreach>2021-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-01-11</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>SocialArk</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Pulse Secure / Ivanti VPN Zero-Day Exploitation by APT5 (US Defense Industrial Base)</title><link>https://breachnotes.vulnetix.com/cloud/2021-04_pulse-secure-apt5-defense-contractors/</link><pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-04_pulse-secure-apt5-defense-contractors/</guid><description>In April 2021, Mandiant (FireEye) and CISA disclosed that at least two Chinese APT groups (tracked as UNC2630 and UNC2717, attributed to APT5 / MANGANESE) had been exploiting zero-day and N-day vulnerabilities in Pulse Connect Secure VPN appliances since at least mid-2020. The primary zero-day, …</description><content:encoded>In April 2021, Mandiant (FireEye) and CISA disclosed that at least two Chinese APT groups (tracked as UNC2630 and UNC2717, attributed to APT5 / MANGANESE) had been exploiting zero-day and N-day vulnerabilities in Pulse Connect Secure VPN appliances since at least mid-2020. The primary zero-day, CVE-2021-22893, allowed unauthenticated remote code execution. Targets included US defense contractors, financial organizations, and government agencies. The attackers deployed multiple sophisticated malware families including SLOWPULSE, RADIALPULSE, HARDPULSE, and QUIETPULSE to maintain persistent access and bypass authentication. CISA issued Emergency Directive 21-03 requiring all federal agencies to run Ivanti&amp;rsquo;s Integrity Checker Tool and report affected devices. At least 12 US organizations were confirmed compromised. The attackers demonstrated deep knowledge of Pulse Secure&amp;rsquo;s internal authentication code, suggesting prior access to the VPN software&amp;rsquo;s source code or extensive research. The incident demonstrated the severe risk of VPN appliances as initial access vectors — particularly for nation-state attackers willing to invest in zero-day research.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/emergency-directive-21-03</breach:sourceUrl><breach:dateOfBreach>2021-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-04-20</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-04-20</breach:dateOfCustomerNotification><breach:initialAttackVector>Multiple Chinese APT groups (UNC2630 / APT5, and others) exploited CVE-2021-22893 and related zero-day vulnerabilities in Pulse Connect Secure VPN appliances to gain unauthorized access to targeted organizations' networks without authentication</breach:initialAttackVector><breach:cve>CVE-2021-22893</breach:cve><breach:cve>CVE-2019-11510</breach:cve><breach:cve>CVE-2020-8260</breach:cve><breach:vendorProduct>Pulse Connect Secure VPN (Pulse Secure / Ivanti)</breach:vendorProduct><breach:cloudProvider>Ivanti</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Socialarks Elasticsearch Exposure — 214 Million Social Media Profiles Scraped</title><link>https://breachnotes.vulnetix.com/cloud/2021-01_socialarks-214m-profiles/</link><pubDate>Fri, 01 Jan 2021 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-01_socialarks-214m-profiles/</guid><description>In January 2021, security researchers at vpnMentor discovered a publicly accessible Elasticsearch database belonging to Socialarks — a Chinese social media management company that offers social media marketing and customer relationship management services. The database contained approximately 408GB …</description><content:encoded>In January 2021, security researchers at vpnMentor discovered a publicly accessible Elasticsearch database belonging to Socialarks — a Chinese social media management company that offers social media marketing and customer relationship management services. The database contained approximately 408GB of data comprising approximately 214 million social media user profiles scraped from Facebook (11.5M profiles), Instagram (8.4M profiles), and LinkedIn (66.8M profiles). The scraped LinkedIn data included real names, email addresses, phone numbers, locations, job titles, work history, education history, and social media connections. Facebook data included private contact details not normally publicly available including personal phone numbers. The data appeared to have been scraped in violation of the platforms&amp;rsquo; terms of service. LinkedIn and Facebook had both been previous targets of large-scale scraping. vpnMentor researchers found that Socialarks CEO Nolist Chen&amp;rsquo;s personal information was included in the dataset. Socialarks secured the database after notification. The exposure included profiles of high-profile executives including Facebook CEO Mark Zuckerberg, LinkedIn CEO Ryan Roslansky, and various politicians. The breach raised questions about data brokerage practices and the legality of large-scale social media scraping, particularly given GDPR and similar data protection obligations.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.vpnmentor.com/blog/report-socialarks-leak/</breach:sourceUrl><breach:dateOfBreach>2021-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2021-01-11</breach:dateOfDisclosure><breach:initialAttackVector>Socialarks — a Chinese social media management company — left an Elasticsearch database exposed publicly without authentication; the database contained scraped and aggregated social media profile data collected by Socialarks from LinkedIn, Facebook, Instagram, and other platforms</breach:initialAttackVector><breach:vendorProduct>Socialarks Elasticsearch database</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Ubiquiti Insider Threat: Employee Steals Data and Extorts Company</title><link>https://breachnotes.vulnetix.com/cloud/2021-01_ubiquiti-insider-threat/</link><pubDate>Thu, 10 Dec 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-01_ubiquiti-insider-threat/</guid><description>In December 2020, Nickolas Sharp, a senior cloud engineer at Ubiquiti Networks (maker of UniFi networking equipment), used his legitimate access to Ubiquiti's AWS infrastructure and GitHub to exfiltrate gigabytes of source code and customer data. Sharp then sent an anonymous extortion demand to …</description><content:encoded><![CDATA[In December 2020, Nickolas Sharp, a senior cloud engineer at Ubiquiti Networks (maker of UniFi networking equipment), used his legitimate access to Ubiquiti&rsquo;s AWS infrastructure and GitHub to exfiltrate gigabytes of source code and customer data. Sharp then sent an anonymous extortion demand to Ubiquiti for ~50 Bitcoin ($1.9M), threatening to publish the stolen data if payment was not made. Ubiquiti disclosed the &rsquo;external breach&rsquo; in January 2021, causing its stock to fall ~20%. Sharp sent tips to media impersonating a whistleblower, claiming the breach was more serious than Ubiquiti admitted. The FBI identified Sharp when a brief VPN dropout during the attack exposed his home IP address in Ubiquiti&rsquo;s AWS CloudTrail logs. Sharp was sentenced to 6 years in federal prison in 2023. This case became a landmark insider threat and security incident response case study, demonstrating the danger of privileged insiders, the importance of cloud audit logging (CloudTrail), and the legal consequences of extortion.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/ubiquiti-hacker-who-stole-data-and-extorted-company-sentenced-to-6-years/</breach:sourceUrl><breach:dateOfBreach>2020-12-10</breach:dateOfBreach><breach:dateOfDisclosure>2021-01-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-01-11</breach:dateOfCustomerNotification><breach:initialAttackVector>Senior cloud engineer at Ubiquiti used his legitimate privileged AWS and GitHub access to clone the company's source code repositories and steal customer data, then used a VPN to disguise his identity while extorting the company</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS); GitHub</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>SolarWinds Orion SUNBURST Supply Chain Attack — Russia SVR, 18,000 Organizations</title><link>https://breachnotes.vulnetix.com/cloud/2020-12_department-of-treasury-and-commerce--solarwinds/</link><pubDate>Tue, 01 Dec 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-12_department-of-treasury-and-commerce--solarwinds/</guid><description>See comprehensive record: data/supply-chain/2020-12_solarwinds-sunburst.yaml. The SolarWinds Orion supply chain attack is the defining supply chain cyber incident of the decade — Russia's SVR compromised a trusted IT monitoring vendor to gain simultaneous access to 18,000 organizations including US …</description><content:encoded>See comprehensive record: data/supply-chain/2020-12_solarwinds-sunburst.yaml. The SolarWinds Orion supply chain attack is the defining supply chain cyber incident of the decade — Russia&amp;rsquo;s SVR compromised a trusted IT monitoring vendor to gain simultaneous access to 18,000 organizations including US federal agencies, Microsoft, Intel, and Cisco. The attack remained undetected for approximately 9 months.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-352a</breach:sourceUrl><breach:dateOfBreach>2020-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-12-01</breach:dateOfDisclosure><breach:initialAttackVector>Russia SVR/Cozy Bear/APT29 compromised SolarWinds' Orion software build pipeline and injected the SUNBURST backdoor into legitimate Orion updates, signed with SolarWinds' code signing certificate and distributed to ~18,000 organizations</breach:initialAttackVector><breach:vendorProduct>SolarWinds Orion IT monitoring platform</breach:vendorProduct><breach:malware>SUNBURST, TEARDROP, RAINDROP</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>SolarWinds</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>FireEye / Mandiant SolarWinds Breach: Red Team Tooling Stolen (SUNBURST Discovery)</title><link>https://breachnotes.vulnetix.com/cloud/2020-12_fireeye-solarwinds-red-team-tools/</link><pubDate>Thu, 01 Oct 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-12_fireeye-solarwinds-red-team-tools/</guid><description>FireEye (now Mandiant) was one of the first and most notable victims of the SUNBURST supply chain attack via SolarWinds Orion. Unlike most SUNBURST victims, FireEye was specifically targeted for follow-on attack by the Russian SVR (Cozy Bear / UNC2452). Attackers exfiltrated FireEye's 'Red Team …</description><content:encoded><![CDATA[FireEye (now Mandiant) was one of the first and most notable victims of the SUNBURST supply chain attack via SolarWinds Orion. Unlike most SUNBURST victims, FireEye was specifically targeted for follow-on attack by the Russian SVR (Cozy Bear / UNC2452). Attackers exfiltrated FireEye&rsquo;s &lsquo;Red Team tools&rsquo; — a collection of custom offensive security tools and exploits used by FireEye&rsquo;s Red Team for authorized penetration testing. The stolen tools were not zero-days but were highly sophisticated implementations of known techniques. FireEye detected the breach through an unusual MFA registration attempt (an attacker tried to register a second device on an employee&rsquo;s account; FireEye&rsquo;s IT security flagged it). FireEye&rsquo;s disclosure on December 8, 2020 was the first public indication of the broader SolarWinds supply chain compromise, which was announced by Microsoft and US government agencies days later. FireEye also published countermeasures (detection rules) for the stolen tools. The breach was notable as an adversary successfully targeting a top-tier cybersecurity company and as the incident that unraveled one of the most significant intelligence operations in cyber history. See also: 2020-12_solarwinds-sunburst.yaml.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.fireeye.com/blog/threat-research/2020/12/unauthorized-access-of-fireeye-red-team-tools.html</breach:sourceUrl><breach:dateOfBreach>2020-10-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-12-08</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-12-08</breach:dateOfCustomerNotification><breach:initialAttackVector>Russian SVR (Cozy Bear / UNC2452) compromised FireEye via the SUNBURST backdoor in a trojanized SolarWinds Orion update — the same supply chain attack as the broader SolarWinds campaign; FireEye was the first organization to detect and publicly disclose the SUNBURST backdoor</breach:initialAttackVector><breach:vendorProduct>SolarWinds Orion (supply chain)</breach:vendorProduct><breach:malware>SUNBURST; TEARDROP</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>SolarWinds</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Broadvoice VoIP Data Exposure (October 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-10_broadvoice-customers-broadvoice/</link><pubDate>Mon, 28 Sep 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-10_broadvoice-customers-broadvoice/</guid><description>Broadvoice, a VoIP (Voice over IP) service provider serving small and medium-sized businesses across the United States, inadvertently exposed a massive Elasticsearch cluster containing over 350 million customer records. The cluster was indexed by the Shodan.io search engine on October 1, 2020, the …</description><content:encoded><![CDATA[<p>Broadvoice, a VoIP (Voice over IP) service provider serving small and medium-sized businesses across the United States, inadvertently exposed a massive Elasticsearch cluster containing over 350 million customer records. The cluster was indexed by the Shodan.io search engine on October 1, 2020, the same day security researcher Bob Diachenko (working on behalf of Comparitech) discovered it. Broadvoice confirmed the data had been publicly accessible since September 28, 2020. After being notified on October 1, the company secured the database the following day.</p>
<p>The unprotected cluster consisted of ten data collections totalling more than 350 million records. The largest single collection held 275 million records containing caller names, phone numbers, and caller locations. A separate collection contained over two million voicemail records, of which approximately 200,000 had been transcribed into text — these transcripts included highly sensitive content such as discussions of financial loans, medical prescriptions, and personal matters. Because Broadvoice offers a unified communications platform with voicemail-to-text transcription services, these audio-derived records carried particularly rich personal detail.</p>
<p>The exposed data included: caller and recipient names, phone numbers, geographic locations, caller device identifiers, call metadata, and transcribed voicemail content referencing health information and financial matters. The presence of health-related voicemail transcripts raised HIPAA concerns, as some of Broadvoice&rsquo;s business customers operate in regulated healthcare-adjacent sectors.</p>
<p>This incident is classified as an inadvertent exposure rather than an active intrusion. No CVEs are applicable — the root cause was a misconfiguration of the Elasticsearch cluster, which lacked any access controls or authentication. This is a recurring pattern across cloud-hosted NoSQL databases (Elasticsearch, MongoDB, CouchDB) where default open configurations are deployed without hardening.</p>
<p>Because Broadvoice provides communications infrastructure to businesses rather than directly to consumers, the downstream impact extends across the entire customer base of those businesses — meaning the true number of individuals whose data was exposed is difficult to quantify precisely. The incident drew significant attention due to the voicemail transcript exposure, which went well beyond typical metadata breaches. Broadvoice did not publicly disclose how many individual customers or end-users were ultimately affected, nor whether it notified downstream business clients or their end users.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.comparitech.com/blog/vpn-privacy/350-million-customer-records-exposed-online/</breach:sourceUrl><breach:dateOfBreach>2020-09-28</breach:dateOfBreach><breach:dateOfDisclosure>2020-10-01</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured Elasticsearch cluster left publicly accessible without authentication</breach:initialAttackVector><breach:vendorProduct>Broadvoice</breach:vendorProduct><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Cisco WebEx AWS IAM User Compromise</title><link>https://breachnotes.vulnetix.com/cloud/2021-09_cisco-webex-iam-compromise/</link><pubDate>Thu, 24 Sep 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2021-09_cisco-webex-iam-compromise/</guid><description>Cisco disclosed in February 2021 that unauthorized actors had compromised AWS IAM credentials associated with the Cisco WebEx Teams video conferencing service. The attackers maintained access from approximately September 2020 through discovery in early 2021 — a dwell time of approximately five …</description><content:encoded>Cisco disclosed in February 2021 that unauthorized actors had compromised AWS IAM credentials associated with the Cisco WebEx Teams video conferencing service. The attackers maintained access from approximately September 2020 through discovery in early 2021 — a dwell time of approximately five months. The incident was attributed to the use of long-lived IAM user credentials rather than role-based temporary credentials. Cisco took remediation steps including rotating all affected credentials and implementing enhanced monitoring. The extended dwell time highlighted the difficulty of detecting credential-based attacks that use legitimate access patterns.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/cisco-discloses-security-incident-involving-cisco-webex-teams/</breach:sourceUrl><breach:dateOfBreach>2020-09-24</breach:dateOfBreach><breach:dateOfDisclosure>2021-02-10</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2021-02-10</breach:dateOfCustomerNotification><breach:initialAttackVector>Attackers compromised AWS IAM user credentials associated with Cisco WebEx's infrastructure, gaining access to Cisco's cloud environment and exfiltrating data before the intrusion was detected</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (IAM); Cisco WebEx</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:iam::{account}:user/{user}</breach:cloudResourceCrit></item><item><title>Tribune Media, Times Media Grup Third-Party Breach (September 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-09_tribune-media-times-media-grup-view-media/</link><pubDate>Tue, 01 Sep 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-09_tribune-media-times-media-grup-view-media/</guid><description>Online marketing company exposes 38+ million US citizen records. The user record files contained full names, addresses, zip codes, emails, and phone numbers of people based in the US. The CyberNews research team discovered an unsecured data bucket that belongs to View Media, an online marketing …</description><content:encoded>Online marketing company exposes 38+ million US citizen records. The user record files contained full names, addresses, zip codes, emails, and phone numbers of people based in the US. The CyberNews research team discovered an unsecured data bucket that belongs to View Media, an online marketing company. The bucket contains close to 39 million US user records, including their full names, email and street addresses, phone numbers and ZIP codes. The database was left on a publicly accessible Amazon Web Services (AWS) server, allowing anyone to access and download the data. Following the 350 million email leak covered by CyberNews earlier in August, this is the second time this summer we encountered an unsecured Amazon bucket containing such massive amounts of user data. Third-party company: View Media.</content:encoded><category>cloud</category><breach:sourceUrl>https://cybernews.com/security/online-marketing-company-exposes-data-of-millions-americans/?web_view=true</breach:sourceUrl><breach:dateOfBreach>2020-09-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-09-03</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>View Media</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Razer Gaming Peripheral Data Exposure — 100,000 Customers' PII via Elasticsearch</title><link>https://breachnotes.vulnetix.com/cloud/2020-08_razer-elasticsearch-100k/</link><pubDate>Sat, 01 Aug 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-08_razer-elasticsearch-100k/</guid><description>In August 2020, security researcher Volodymyr Diachenko discovered a publicly accessible Elasticsearch cluster belonging to Razer — the US gaming hardware company known for gaming peripherals, laptops, and accessories. The exposed cluster contained personal data for approximately 100,000 Razer …</description><content:encoded>In August 2020, security researcher Volodymyr Diachenko discovered a publicly accessible Elasticsearch cluster belonging to Razer — the US gaming hardware company known for gaming peripherals, laptops, and accessories. The exposed cluster contained personal data for approximately 100,000 Razer customers who had placed online orders. Exposed data included customer names, email addresses, phone numbers, customer internal IDs, order numbers, order details, shipping addresses, and billing addresses. The data did not include payment card information. The exposure was estimated to have been publicly accessible for approximately one month before being discovered. Razer was notified and secured the database. The researcher initially attempted to contact Razer through their support channels (having no direct security contact mechanism) before discovering a way to reach Razer&amp;rsquo;s security team. Razer subsequently offered to compensate the researcher $1,337 in Razer Gold, which was seen by the security community as an inadequate response to a researcher who had responsibly disclosed a significant breach. Razer later stated the response was a misunderstanding and attempted to provide appropriate recognition. The incident highlighted challenges in responsible disclosure when companies lack clear security contact procedures.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/razer-exposes-100k-gamers-personal-data-in-misconfigured-elasticsearch/</breach:sourceUrl><breach:dateOfBreach>2020-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-09-09</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-09-09</breach:dateOfCustomerNotification><breach:initialAttackVector>Razer's customer data was inadvertently exposed through a misconfigured Elasticsearch cluster that was publicly accessible without authentication; the misconfiguration was set up by a vendor and the public exposure lasted approximately one month before being discovered</breach:initialAttackVector><breach:vendorProduct>Razer customer Elasticsearch cluster</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Drizly GitHub Credentials and RDS Database Breach</title><link>https://breachnotes.vulnetix.com/cloud/2020-06_drizly-github-rds-breach/</link><pubDate>Fri, 12 Jun 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-06_drizly-github-rds-breach/</guid><description>In June 2020, Drizly (an online alcohol delivery service) suffered a data breach when an attacker discovered AWS credentials stored in a plaintext format in an internal GitHub repository. The credentials were accessible to all Drizly employees and had been present for two years. The attacker used …</description><content:encoded>In June 2020, Drizly (an online alcohol delivery service) suffered a data breach when an attacker discovered AWS credentials stored in a plaintext format in an internal GitHub repository. The credentials were accessible to all Drizly employees and had been present for two years. The attacker used these credentials to access an Amazon RDS database and exfiltrate personal data for approximately 2.5 million customers. Exposed data included names, email addresses, IP addresses, dates of birth, hashed passwords, and postal codes. The FTC subsequently took enforcement action against Drizly and its CEO James Rellas, ordering security improvements. In a notable precedent, the FTC order required Rellas personally to implement a security program at any future company he leads for 10 years — holding an individual executive accountable for the company&amp;rsquo;s security failures. This case is frequently cited in discussions of executive accountability for cybersecurity.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.ftc.gov/legal-library/browse/cases-proceedings/2123061-drizly-llc</breach:sourceUrl><breach:dateOfBreach>2020-06-12</breach:dateOfBreach><breach:dateOfDisclosure>2020-06-28</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-06-28</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker found Drizly AWS credentials stored in an unsecured GitHub repository (accessible to all Drizly employees), used them to access an RDS database containing 2.5 million customer records</breach:initialAttackVector><breach:vendorProduct>GitHub; Amazon RDS; Amazon Web Services</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:rds:{region}:{account}:db:{id}</breach:cloudResourceCrit></item><item><title>Joomla Third-Party Breach (June 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-06_joomla-open-source-matters/</link><pubDate>Mon, 01 Jun 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-06_joomla-open-source-matters/</guid><description>Joomla team discloses data breach. Joomla says a team member left an unencrypted backup of the JRD portal on a private AWS S3 bucket. The team behind the Joomla open source content management system (CMS) announced a security breach last week. The incident took place after a member of the Joomla …</description><content:encoded>Joomla team discloses data breach. Joomla says a team member left an unencrypted backup of the JRD portal on a private AWS S3 bucket. The team behind the Joomla open source content management system (CMS) announced a security breach last week. The incident took place after a member of the Joomla Resources Directory (JRD) team left a full backup of the JRD site ( resources.joomla.org ) on an Amazon Web Services S3 bucket owned by their own company. Third-party company: Open Source Matters.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.zdnet.com/article/joomla-team-discloses-data-breach/</breach:sourceUrl><breach:dateOfBreach>2020-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-06-01</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Open Source Matters</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Zoom Credential Stuffing — 500,000 Accounts Sold on Dark Web</title><link>https://breachnotes.vulnetix.com/cloud/2020-04_zoom-credential-stuffing-530k/</link><pubDate>Wed, 01 Apr 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-04_zoom-credential-stuffing-530k/</guid><description>In April 2020, at the height of the COVID-19 pandemic when Zoom usage had surged from approximately 10 million to 300 million daily meeting participants in three months, approximately 530,000 Zoom account credentials were found being sold on the dark web for less than $0.01 each (totalling …</description><content:encoded><![CDATA[In April 2020, at the height of the COVID-19 pandemic when Zoom usage had surged from approximately 10 million to 300 million daily meeting participants in three months, approximately 530,000 Zoom account credentials were found being sold on the dark web for less than $0.01 each (totalling approximately $5,000). Cybersecurity firm Cyble discovered the credentials were being sold in hacker forums. The credentials were obtained through credential stuffing — attackers used email/password combinations from other breaches to log into Zoom accounts. Exposed data included email addresses, passwords (in some cases plaintext), host keys, personal meeting URLs, and Zoom account types. Zoom confirmed the attack was credential stuffing (not a breach of Zoom&rsquo;s own systems) and urged users to use unique passwords and enable two-factor authentication. Zoom was already facing intense security scrutiny during this period due to concerns about &lsquo;Zoombombing&rsquo; (uninvited participants joining meetings) and questions about its encryption and data routing. The company had also falsely advertised &rsquo;end-to-end encryption&rsquo; for meetings. The credential stuffing incident contributed to Zoom&rsquo;s &lsquo;90-day security plan&rsquo; announced by CEO Eric Yuan. Zoom&rsquo;s rapid growth during COVID-19 made it an attractive target for credential attacks — a compromised Zoom account could grant access to meetings, recordings, and contacts.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/over-500-000-zoom-accounts-sold-on-hacker-forums-the-dark-web/</breach:sourceUrl><breach:dateOfBreach>2020-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-04-14</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-04-14</breach:dateOfCustomerNotification><breach:initialAttackVector>Credential stuffing using credentials from previously breached services — attackers compiled email/password combinations from unrelated data breaches and tested them against Zoom accounts, successfully accessing accounts where users had reused passwords</breach:initialAttackVector><breach:vendorProduct>Zoom Video Communications user accounts</breach:vendorProduct><breach:cloudProvider>Zoom</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>FireEye / CISA / US GAO / Rapid7</title><link>https://breachnotes.vulnetix.com/cloud/2020-12_solarwinds-sunburst/</link><pubDate>Thu, 26 Mar 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-12_solarwinds-sunburst/</guid><description>Russian SVR (APT29/Cozy Bear) compromised SolarWinds build environment and injected SUNBURST backdoor into Orion software updates distributed March-June 2020. ~18,000 customers received poisoned update; ~100 organizations actively targeted including US Treasury, State Dept, DHS, FireEye. Initial …</description><content:encoded>Russian SVR (APT29/Cozy Bear) compromised SolarWinds build environment and injected SUNBURST backdoor into Orion software updates distributed March-June 2020. ~18,000 customers received poisoned update; ~100 organizations actively targeted including US Treasury, State Dept, DHS, FireEye. Initial network compromise began Sept 2019. Discovered Dec 13 2020 when FireEye investigated theft of its own red team tools. MITRE ATT&amp;amp;CK Campaign C0024. US and UK governments attributed to Russian SVR in April 2021.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.rapid7.com/blog/post/2020/12/14/solarwinds-sunburst-backdoor-supply-chain-attack-what-you-need-to-know/</breach:sourceUrl><breach:dateOfBreach>2020-03-26</breach:dateOfBreach><breach:dateOfDisclosure>2020-12-13</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-12-14</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-506: Embedded Malicious Code inserted into SolarWinds Orion build pipeline</breach:initialAttackVector><breach:cve>CVE-2020-10148</breach:cve><breach:vendorProduct>SolarWinds Orion Platform</breach:vendorProduct><breach:softwarePackage>SolarWinds Orion</breach:softwarePackage><breach:malware>SUNBURST / TEARDROP / SUNSPOT</breach:malware><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>SolarWinds</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>CAM4 Elasticsearch Misconfiguration (10.88 Billion Records, Sexual Orientation Data)</title><link>https://breachnotes.vulnetix.com/cloud/2020-03_cam4-elasticsearch-10bn-records/</link><pubDate>Mon, 16 Mar 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-03_cam4-elasticsearch-10bn-records/</guid><description>On March 16, 2020, researchers at Safety Detectives discovered a production Elasticsearch logging database belonging to CAM4 (an adult live-streaming platform operated by Granity Entertainment, based in Ireland) that was publicly accessible without any authentication. The exposed database contained …</description><content:encoded>On March 16, 2020, researchers at Safety Detectives discovered a production Elasticsearch logging database belonging to CAM4 (an adult live-streaming platform operated by Granity Entertainment, based in Ireland) that was publicly accessible without any authentication. The exposed database contained approximately 10.88 billion records — making it one of the largest data exposures ever discovered by sheer record volume, though many were duplicate log entries. Exposed data included email addresses, usernames, passwords (hashed), payment logs and partial transaction details, IP addresses, country of origin, device and browser information, private chat transcripts between users, and — critically — sexual orientation data inferred from content preferences and explicit user profile fields. The combination of sexual orientation, identity, and contact information created serious blackmail and outing risks for users. An estimated 6.6 million records belonged to US users, 5.4 million to Brazilian users, 4.9 million to Italian users. Safety Detectives responsibly disclosed the exposure to CAM4, which secured the database within hours of notification. Ireland&amp;rsquo;s Data Protection Commission was notified as CAM4 operates under EU/GDPR jurisdiction. No confirmed malicious access was identified, but given the sensitive nature of the data, the potential for harm was severe. The incident highlighted the particular risk when misconfigured databases expose sensitive behavioral and sexual orientation data.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.safetyd etectives.com/blog/cam4-data-breach/</breach:sourceUrl><breach:dateOfBreach>2020-03-16</breach:dateOfBreach><breach:dateOfDisclosure>2020-03-16</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-03-16</breach:dateOfCustomerNotification><breach:initialAttackVector>Misconfigured Elasticsearch production logging database left publicly accessible on the internet without authentication; no malicious actor required — the data was fully open to anyone who found the server</breach:initialAttackVector><breach:vendorProduct>Elasticsearch</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>First Republic Bank AWS Insider Threat Data Exfiltration</title><link>https://breachnotes.vulnetix.com/cloud/2020-03_first-republic-bank-aws-insider/</link><pubDate>Wed, 11 Mar 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-03_first-republic-bank-aws-insider/</guid><description>In March 2020, First Republic Bank (a US private bank and wealth management company) disclosed that an insider threat incident had occurred. A bank employee with legitimate access to AWS cloud systems used those credentials to exfiltrate customer data over a brief window on March 11-12, 2020. The …</description><content:encoded>In March 2020, First Republic Bank (a US private bank and wealth management company) disclosed that an insider threat incident had occurred. A bank employee with legitimate access to AWS cloud systems used those credentials to exfiltrate customer data over a brief window on March 11-12, 2020. The data exfiltrated included customer names, addresses, and account information. First Republic Bank promptly identified the unauthorized access, terminated the employee&amp;rsquo;s access, and notified affected customers and regulators. The incident occurred around the same time as the COVID-19 lockdown began, which likely affected the bank&amp;rsquo;s ability to monitor for insider threats.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/first-republic-bank-insider-stole-customer-data-using-aws-access/</breach:sourceUrl><breach:dateOfBreach>2020-03-11</breach:dateOfBreach><breach:dateOfDisclosure>2020-03-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-03-12</breach:dateOfCustomerNotification><breach:initialAttackVector>A First Republic Bank employee with legitimate AWS access used their credentials to exfiltrate customer data from AWS-hosted banking systems</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Zoom Credential Stuffing — 530K Accounts Sold on Dark Web</title><link>https://breachnotes.vulnetix.com/cloud/2020-04_zoom-credential-stuffing-530k-accounts/</link><pubDate>Sun, 01 Mar 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-04_zoom-credential-stuffing-530k-accounts/</guid><description>In April 2020, cybersecurity firm Cyble reported discovering approximately 530,000 Zoom account credentials being sold on dark web forums for as little as a fraction of a cent each, with some being given away free. Zoom confirmed the accounts were compromised via credential stuffing attacks using …</description><content:encoded>In April 2020, cybersecurity firm Cyble reported discovering approximately 530,000 Zoom account credentials being sold on dark web forums for as little as a fraction of a cent each, with some being given away free. Zoom confirmed the accounts were compromised via credential stuffing attacks using credentials from unrelated prior breaches (not a breach of Zoom&amp;rsquo;s own infrastructure). The timing coincided with the massive surge in Zoom usage during the COVID-19 pandemic — daily meeting participants jumped from 10 million in December 2019 to over 300 million in April 2020. The compromised accounts included personal meeting URLs, email addresses, passwords, and host keys. Some accounts belonged to educational institutions, financial firms, and healthcare organizations. Zoom stated it was working with intelligence firms to identify credential stuffing tools and block them, and was implementing automated bot detection. The incident highlighted the risk of password reuse across services and the targeting of high-profile platforms during the pandemic period. Zoom was concurrently dealing with multiple security and privacy concerns including &amp;lsquo;Zoombombing&amp;rsquo; incidents.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.cybersecurity-insiders.com/zoom-confirms-500000-accounts-sold-on-dark-web/</breach:sourceUrl><breach:dateOfBreach>2020-03-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-04-13</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-04-13</breach:dateOfCustomerNotification><breach:initialAttackVector>Credential stuffing — attackers used large lists of username/password combinations from prior unrelated data breaches to attempt automated logins to Zoom accounts; successful matches were then compiled and sold</breach:initialAttackVector><breach:vendorProduct>Zoom Video Communications</breach:vendorProduct><breach:cloudProvider>Zoom</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Estée Lauder Unsecured Elasticsearch Database — 440 Million Records</title><link>https://breachnotes.vulnetix.com/cloud/2020-01_estee-lauder-440m-elasticsearch/</link><pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-01_estee-lauder-440m-elasticsearch/</guid><description>In February 2020, security researcher Jeremiah Fowler discovered a publicly accessible Elasticsearch database belonging to Estée Lauder — one of the world's largest cosmetics and beauty companies (also owning MAC Cosmetics, Clinique, Bobbi Brown, La Mer, and dozens of other brands). The database …</description><content:encoded>In February 2020, security researcher Jeremiah Fowler discovered a publicly accessible Elasticsearch database belonging to Estée Lauder — one of the world&amp;rsquo;s largest cosmetics and beauty companies (also owning MAC Cosmetics, Clinique, Bobbi Brown, La Mer, and dozens of other brands). The database contained approximately 440 million records totalling multiple gigabytes of data. The exposed records included internal business documents, email logs, IP addresses, internal production and staging environment information, references to middleware platforms and CMS systems, and other operational data. Many of the records appeared to be from various Estée Lauder business systems. A significant portion appeared to be email addresses — possibly from email marketing systems. Fowler reported the exposure to Estée Lauder, who secured the database promptly after notification. Estée Lauder declined to provide detailed comment on the nature or scope of the data exposed. The company did not file a public breach notification, suggesting no customer personal data (as regulated by GDPR or state laws) was directly exposed, or that the regulatory threshold for notification was not met. The incident highlighted how large multinational consumer goods companies can inadvertently expose large amounts of internal operational data through misconfigured cloud database instances.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.vpnmentor.com/blog/report-estee-lauder-leak/</breach:sourceUrl><breach:dateOfBreach>2020-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-02-10</breach:dateOfDisclosure><breach:initialAttackVector>Security researcher Jeremiah Fowler discovered that Estée Lauder's internal Elasticsearch database was publicly accessible without any authentication or password protection; the database contained internal records and email addresses</breach:initialAttackVector><breach:vendorProduct>Estée Lauder Companies Elasticsearch database</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>State Governments of U.S. Third-Party Breach (January 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-01_state-governments-of-u-s-not-disclosed/</link><pubDate>Wed, 01 Jan 2020 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-01_state-governments-of-u-s-not-disclosed/</guid><description>Data Leak Exposes 750K Birth Certificate Applications. AWS misconfiguration leaves storage bucket wide open. Over 750,000 applications for US birth certificates have been found exposed online thanks to a misconfigured cloud server.</description><content:encoded>Data Leak Exposes 750K Birth Certificate Applications. AWS misconfiguration leaves storage bucket wide open. Over 750,000 applications for US birth certificates have been found exposed online thanks to a misconfigured cloud server.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.infosecurity-magazine.com/news/data-leak-exposes-750k-birth-cert/</breach:sourceUrl><breach:dateOfBreach>2020-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-12-10</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>Not disclosed</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Travelex REvil Ransomware via Unpatched Pulse Secure VPN (Company Collapse)</title><link>https://breachnotes.vulnetix.com/cloud/2020-01_travelex-revil-pulse-secure/</link><pubDate>Tue, 31 Dec 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-01_travelex-revil-pulse-secure/</guid><description>On New Year's Eve 2019, REvil ransomware operators exploited CVE-2019-11510 in Travelex's unpatched Pulse Secure VPN to gain initial access to Travelex's corporate network. Travelex, the world's largest retail foreign exchange company (operating in 70 countries with kiosks in major airports), took …</description><content:encoded><![CDATA[On New Year&rsquo;s Eve 2019, REvil ransomware operators exploited CVE-2019-11510 in Travelex&rsquo;s unpatched Pulse Secure VPN to gain initial access to Travelex&rsquo;s corporate network. Travelex, the world&rsquo;s largest retail foreign exchange company (operating in 70 countries with kiosks in major airports), took all its systems offline on January 2, 2020 after detecting the ransomware. For weeks, Travelex employees at airport kiosks and retail locations worldwide could only offer manual currency exchange by pen and paper. Major bank partners including Lloyds Bank, Barclays, Royal Bank of Scotland, and HSBC had their online currency services disrupted as they relied on Travelex&rsquo;s platform. REvil demanded a $6 million ransom, which Travelex reportedly paid approximately $2.3 million after negotiations. Despite paying the ransom and decrypting systems, Travelex had already suffered extensive damage. Combined with COVID-19 travel disruptions later that year, Travelex filed for administration (bankruptcy) in August 2020, with the ransomware attack cited as a contributing factor. The attack was a landmark demonstration of CVE-2019-11510 exploitation and the severe business consequences of failing to patch critical VPN vulnerabilities.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bbc.co.uk/news/business-51017852</breach:sourceUrl><breach:dateOfBreach>2019-12-31</breach:dateOfBreach><breach:dateOfDisclosure>2020-01-02</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-01-17</breach:dateOfCustomerNotification><breach:initialAttackVector>REvil (Sodinokibi) exploited CVE-2019-11510, a critical path traversal vulnerability in Pulse Secure VPN that allowed unauthenticated remote file reading, including cached plaintext VPN credentials; patch had been available since April 2019</breach:initialAttackVector><breach:cve>CVE-2019-11510</breach:cve><breach:vendorProduct>Pulse Secure VPN</breach:vendorProduct><breach:malware>REvil (Sodinokibi) ransomware</breach:malware><breach:cloudProvider>Ivanti</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Xerox, CenturyLink, Nasdaq, General Electric, Forever21, and Dunkin Donuts Third-Party Breach (December 2019)</title><link>https://breachnotes.vulnetix.com/cloud/2019-12_xerox-centurylink-nasdaq-general-ele-ipr-software/</link><pubDate>Sun, 01 Dec 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-12_xerox-centurylink-nasdaq-general-ele-ipr-software/</guid><description>GE, Dunkin', Forever 21 Caught Up in Broad Internal Document Leak. A PR and marketing provider exposed sensitive data for a raft of big-name companies. A marketing firm exposed hashed passwords and sensitive public relations documents of thousands of customers via a leaky Amazon S3 database – …</description><content:encoded>GE, Dunkin&amp;rsquo;, Forever 21 Caught Up in Broad Internal Document Leak. A PR and marketing provider exposed sensitive data for a raft of big-name companies. A marketing firm exposed hashed passwords and sensitive public relations documents of thousands of customers via a leaky Amazon S3 database – including big-name brands like GE, Dunkin’ Donuts, Forever 21 and more. Researchers with UpGuard in October discovered a misconfigured Amazon S3 storage bucket, originating from iPR Software, a hosted content management software platform for online newsrooms, websites and social-media communications. The database contained data belonging to clients using iPR Software’s platform, including the details of 477,000 clients’ media contacts, business entity account information, 35,000 hashed user passwords, assorted documents and administrative system credentials. Third-party company: iPR Software.</content:encoded><category>cloud</category><breach:sourceUrl>https://threatpost.com/ge-dunkin-forever21-internal-doc-leak/150920/</breach:sourceUrl><breach:dateOfBreach>2019-12-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-12-09</breach:dateOfDisclosure><breach:initialAttackVector>Compromise of third-party service provider / vendor relationship</breach:initialAttackVector><breach:vendorProduct>iPR Software</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>BioStar 2 Biometric Security Platform Exposure — 27.8 Million Records, 1 Million Fingerprints</title><link>https://breachnotes.vulnetix.com/cloud/2019-08_biostar2-biometric-27m/</link><pubDate>Thu, 01 Aug 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-08_biostar2-biometric-27m/</guid><description>In August 2019, vpnMentor security researchers Noam Rotem and Ran Locar discovered a publicly accessible Elasticsearch database belonging to Suprema — a South Korean security company whose BioStar 2 platform manages biometric access control (fingerprint and facial recognition) for facilities …</description><content:encoded>In August 2019, vpnMentor security researchers Noam Rotem and Ran Locar discovered a publicly accessible Elasticsearch database belonging to Suprema — a South Korean security company whose BioStar 2 platform manages biometric access control (fingerprint and facial recognition) for facilities worldwide. The unsecured database contained approximately 27.8 million records totalling approximately 23 gigabytes of data. Most critically, the database contained actual fingerprint data (minutiae templates) for over 1 million individuals who used fingerprint scanners for facility access — and biometric data cannot be changed once compromised. Additional exposed data included: unencrypted usernames and passwords, facial recognition data and photographs, personal information (names, addresses, emails), records of security and facility access, details of facial recognition systems and CCTV installations, and mobile device information. BioStar 2 is used by over 1.5 million organisations worldwide including governments, banks, defence contractors, and corporations. UK Metropolitan Police contracted facilities used BioStar 2. The researchers notified Suprema who secured the database. The exposure of fingerprint data and facial recognition templates was particularly alarming because biometric data is immutable — unlike passwords or credit card numbers, you cannot change your fingerprints. The breach was described by privacy experts as one of the most serious biometric data exposures ever recorded.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.vpnmentor.com/blog/report-biostar2-leak/</breach:sourceUrl><breach:dateOfBreach>2019-08-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-08-14</breach:dateOfDisclosure><breach:initialAttackVector>Security researchers at vpnMentor discovered that Suprema's BioStar 2 web-based security platform had a publicly accessible, unprotected Elasticsearch database; the database was accessible without authentication and contained the biometric and security management data for the platform's clients</breach:initialAttackVector><breach:vendorProduct>Suprema BioStar 2 biometric access control platform</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>MGM Resorts 2019 Data Breach — 10.6 Million Guests, Dark Web Dump 2020</title><link>https://breachnotes.vulnetix.com/cloud/2019-07_mgm-resorts-cloud-10-6m/</link><pubDate>Mon, 01 Jul 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-07_mgm-resorts-cloud-10-6m/</guid><description>In July 2019, an attacker accessed a cloud server at MGM Resorts International and extracted personal data for approximately 10.6 million hotel guests. The breach went undetected until February 2020, when ZDNet reported that data for 10.6 million former MGM hotel guests was being shared on a hacking …</description><content:encoded>In July 2019, an attacker accessed a cloud server at MGM Resorts International and extracted personal data for approximately 10.6 million hotel guests. The breach went undetected until February 2020, when ZDNet reported that data for 10.6 million former MGM hotel guests was being shared on a hacking forum. The disclosed data included names, home addresses, phone numbers, emails, and dates of birth for a wide range of guests including government officials, celebrities, tech CEOs, and reporters. Guests whose data was exposed included Twitter CEO Jack Dorsey, Nevada Governor Steve Sisolak, German state officials, and employees of major tech firms. MGM confirmed the breach but characterised it as limited in scope. The irony was significant: this 2019 breach of MGM&amp;rsquo;s guest data preceded by four years the much larger and more devastating 2023 MGM Scattered Spider ransomware attack, suggesting MGM had a persistent vulnerability in protecting guest data. MGM offered no credit monitoring for affected guests. The hacking forum post contained the data divided across multiple files. Note: this is separate from the massive September 2023 Scattered Spider/ALPHV ransomware attack against MGM which caused $100M+ in losses.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.zdnet.com/article/mgm-resorts-data-breach-details-of-over-10-6-million-hotel-guests-published-on-hacking-forum/</breach:sourceUrl><breach:dateOfBreach>2019-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-02-19</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2020-02-19</breach:dateOfCustomerNotification><breach:initialAttackVector>An unauthorized attacker gained access to a cloud server used by MGM Resorts and extracted guest data; MGM had stored the data in a cloud server that was accessible without proper authentication controls; the breach was not discovered until ZDNet reporter Catalin Cimpanu was alerted to the data being circulated on a hacking forum</breach:initialAttackVector><breach:vendorProduct>MGM Resorts cloud server (guest data)</breach:vendorProduct><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Docker Hub Database Breach — 190,000 User Accounts, GitHub and Bitbucket Tokens</title><link>https://breachnotes.vulnetix.com/cloud/2019-04_docker-hub-oauth-tokens/</link><pubDate>Thu, 25 Apr 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-04_docker-hub-oauth-tokens/</guid><description>On 25 April 2019, Docker discovered unauthorized access to a Docker Hub database containing data for approximately 190,000 accounts (less than 5% of Hub users). Docker Hub is the world's largest container registry, used by millions of developers to store and share Docker container images. Exposed …</description><content:encoded>On 25 April 2019, Docker discovered unauthorized access to a Docker Hub database containing data for approximately 190,000 accounts (less than 5% of Hub users). Docker Hub is the world&amp;rsquo;s largest container registry, used by millions of developers to store and share Docker container images. Exposed data included: usernames and hashed passwords (for accounts not using SSO); GitHub and Bitbucket OAuth tokens used for automated Docker Hub builds. Docker disclosed the breach on 26 April 2019 — within 24 hours of discovery. Docker immediately revoked all GitHub and Bitbucket OAuth tokens and required affected users to reconnect their repositories. This was the most serious aspect of the breach: the revoked tokens could have allowed attackers to access private code repositories for an unknown number of GitHub and Bitbucket accounts linked to Docker Hub. Automated build systems that relied on these tokens were disrupted. Docker notified affected users and reset passwords. The brief exposure window (hours to a day) and rapid response minimised the impact, but the potential for attackers to clone private source code repositories during the exposure window was concerning. The incident highlighted the supply chain risk of OAuth token storage in developer platform integrations.</content:encoded><category>cloud</category><breach:sourceUrl>https://success.docker.com/article/docker-hub-user-notification</breach:sourceUrl><breach:dateOfBreach>2019-04-25</breach:dateOfBreach><breach:dateOfDisclosure>2019-04-26</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2019-04-26</breach:dateOfCustomerNotification><breach:initialAttackVector>Unauthorized access to a database storing a subset of non-financial Docker Hub user data; Docker stated the database was accessed without authorization but did not disclose the specific attack vector</breach:initialAttackVector><breach:vendorProduct>Docker Hub user database</breach:vendorProduct><breach:cloudProvider>Docker Hub</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Capital One AWS SSRF/IMDSv1 Breach (106M Records, $190M Settlement)</title><link>https://breachnotes.vulnetix.com/cloud/2019-07_capital-one-ssrf-imdsv1-106m/</link><pubDate>Fri, 22 Mar 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-07_capital-one-ssrf-imdsv1-106m/</guid><description>On March 22-23, 2019, Paige Thompson (alias 'erratic'), a former AWS software engineer, exploited a misconfigured AWS Web Application Firewall (WAF) running on Capital One's EC2 infrastructure. The misconfiguration allowed SSRF, which Thompson used to make requests from the Capital One server to the …</description><content:encoded>On March 22-23, 2019, Paige Thompson (alias &amp;rsquo;erratic&amp;rsquo;), a former AWS software engineer, exploited a misconfigured AWS Web Application Firewall (WAF) running on Capital One&amp;rsquo;s EC2 infrastructure. The misconfiguration allowed SSRF, which Thompson used to make requests from the Capital One server to the AWS EC2 Instance Metadata Service (IMDSv1) at 169.254.169.254. IMDSv1 returns temporary IAM credentials to anyone who can reach it, including via SSRF — a fundamental design flaw that AWS later addressed with IMDSv2. Using the stolen IAM role credentials, Thompson listed and accessed over 700 S3 buckets containing Capital One credit card application data. The breach exposed approximately 106 million credit card applications with: names, addresses, zip codes, phone numbers, email addresses, dates of birth, self-reported income, credit scores, credit limits, payment history, and approximately 140,000 Social Security numbers and 80,000 bank account numbers. Thompson posted the stolen data publicly in a GitHub repository and boasted about it in a Slack channel, which led to her arrest. Capital One paid an $80 million OCC fine and a $190 million class action settlement. The case is a landmark in cloud security for demonstrating the SSRF-to-IMDSv1 attack chain and drove AWS to make IMDSv2 the default, mandate its use, and ultimately deprecate IMDSv1.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.breachsense.com/blog/capital-one-data-breach-case-study/</breach:sourceUrl><breach:dateOfBreach>2019-03-22</breach:dateOfBreach><breach:dateOfDisclosure>2019-07-29</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2019-07-29</breach:dateOfCustomerNotification><breach:initialAttackVector>Paige Thompson (former AWS engineer) exploited a Server-Side Request Forgery (SSRF) vulnerability in a misconfigured AWS WAF to reach the EC2 Instance Metadata Service (IMDSv1) endpoint, stealing temporary IAM role credentials; used those credentials to access 700+ S3 buckets containing Capital One customer data</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (WAF, EC2 IMDSv1, S3)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>shared</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:ec2:{region}:{account}:instance/{id}</breach:cloudResourceCrit></item><item><title>BHIM App / CSC e-Governance Services AWS S3 Misconfiguration (May 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-05_bhim-wallet-app-csc-e-governance-service/</link><pubDate>Fri, 01 Feb 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-05_bhim-wallet-app-csc-e-governance-service/</guid><description>In late May 2020, researchers at vpnMentor discovered that CSC e-Governance Services Ltd — the
government-mandated third party operating the merchant onboarding portal for India's Bharat Interface
for Money (BHIM) unified payments platform — had left an Amazon Web Services S3 bucket completely
open …</description><content:encoded><![CDATA[<p>In late May 2020, researchers at vpnMentor discovered that CSC e-Governance Services Ltd — the
government-mandated third party operating the merchant onboarding portal for India&rsquo;s Bharat Interface
for Money (BHIM) unified payments platform — had left an Amazon Web Services S3 bucket completely
open and publicly accessible. The misconfigured bucket, hosted under the cscbhim.in domain, contained
approximately 409 GB of highly sensitive financial and personal data belonging to an estimated 7.26
million Indian citizens. The records dated back to at least February 2019.</p>
<p>Data exposed included Aadhaar card numbers and scanned images, Permanent Account Number (PAN) card
data, biometric details, caste and religion certificates, residential addresses, professional degree
certificates, user photographs, UPI IDs, and bank account details. The breadth of exposure was
particularly severe because BHIM is deeply integrated with India&rsquo;s national digital identity
infrastructure; compromised Aadhaar numbers combined with financial identifiers create a high-risk
vector for identity fraud and targeted phishing.</p>
<p>The National Payments Corporation of India (NPCI), which operates BHIM, initially denied any
compromise at the app level, stating the breach was not within BHIM&rsquo;s own systems. This was technically
accurate — the data sat in CSC&rsquo;s infrastructure rather than NPCI&rsquo;s — but critics argued the distinction
did little to protect affected users. India&rsquo;s Computer Emergency Response Team (CERT-In) was notified
twice by vpnMentor before the bucket was eventually secured.</p>
<p>The incident illustrates a recurring pattern in government-linked digital payment ecosystems:
national-scale identity data is funneled through third-party contractor portals that may not be subject
to the same security oversight as the core platform. No CVE applied as the root cause was a
configuration failure rather than a software vulnerability. The breach prompted calls for mandatory
cloud security audits of all entities handling Aadhaar-linked data. No threat actor was identified;
the data appears to have been passively exposed rather than actively exfiltrated, though it is unknown
whether malicious parties downloaded data before the bucket was secured. No customer notification
programme was publicly announced by CSC or NPCI.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.vpnmentor.com/blog/report-csc-bhim-leak/</breach:sourceUrl><breach:dateOfBreach>2019-02-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-05-29</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured AWS S3 bucket publicly exposing 409 GB of sensitive financial and identity data</breach:initialAttackVector><breach:vendorProduct>CSC e-Governance Services Ltd (cscbhim.in)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Verifications.io Elasticsearch Exposure — 763 Million Email Records</title><link>https://breachnotes.vulnetix.com/cloud/2019-02_verifications-io-763m-emails/</link><pubDate>Fri, 01 Feb 2019 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-02_verifications-io-763m-emails/</guid><description>In March 2019, security researchers Bob Diachenko and Vinny Troia discovered a massive publicly accessible Elasticsearch database belonging to Verifications.io — an email verification service that businesses use to validate email addresses in their marketing lists. The database contained …</description><content:encoded>In March 2019, security researchers Bob Diachenko and Vinny Troia discovered a massive publicly accessible Elasticsearch database belonging to Verifications.io — an email verification service that businesses use to validate email addresses in their marketing lists. The database contained approximately 763 million unique email addresses along with associated personal data including: names, IP addresses, dates of birth, geographic data, employer information, job titles, phone numbers, genders, and credit scores for a significant portion of records. The database totaled approximately 150GB of data. Verifications.io took the database offline after being notified by security researchers. Verifications.io also shut down their website (verifications.io), removing it completely. The scale of the exposure — 763 million email records — made it one of the largest single data exposures ever discovered at that time. The data appeared to be a compilation of information from numerous sources for email marketing and lead generation purposes. The individuals whose data was exposed had not knowingly provided it to Verifications.io. The exposure was added to Have I Been Pwned, making it one of the largest additions in that service&amp;rsquo;s history. The incident highlighted the risks of &amp;lsquo;data broker&amp;rsquo; and email marketing services that aggregate personal data at massive scale without direct consumer consent.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/hacker-finds-763-million-records-of-us-citizens-left-exposed-online/</breach:sourceUrl><breach:dateOfBreach>2019-02-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-03-01</breach:dateOfDisclosure><breach:initialAttackVector>Verifications.io, an email verification service, left an Elasticsearch database containing 763 million records exposed publicly on the internet without authentication; the database was discovered by security researchers Bob Diachenko and Vinny Troia</breach:initialAttackVector><breach:vendorProduct>Verifications.io Elasticsearch database</breach:vendorProduct><breach:softwarePackage>Elasticsearch</breach:softwarePackage><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>UpGuard / Bitdefender / Healthcare IT News</title><link>https://breachnotes.vulnetix.com/cloud/2018-08_150-businesses-including-those-in-tr-medcall-healthcare-advis/</link><pubDate>Fri, 24 Aug 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-08_150-businesses-including-those-in-tr-medcall-healthcare-advis/</guid><description>On August 24, 2018, cybersecurity researchers at UpGuard discovered a publicly accessible, misconfigured Amazon Web Services S3 storage bucket belonging to MedCall Healthcare Advisors, a North Carolina-based workers' compensation and occupational healthcare services vendor. The exposed bucket …</description><content:encoded><![CDATA[On August 24, 2018, cybersecurity researchers at UpGuard discovered a publicly accessible, misconfigured Amazon Web Services S3 storage bucket belonging to MedCall Healthcare Advisors, a North Carolina-based workers&rsquo; compensation and occupational healthcare services vendor. The exposed bucket contained approximately 7 gigabytes of sensitive data spanning 181 US business locations served by MedCall, affecting nearly 3,000 individuals.
The exposed data included PDF injury intake forms containing detailed descriptions of workplace injuries and illnesses, employment history, Social Security numbers, names, email and postal addresses, phone numbers, and dates of birth. More alarmingly, the bucket also contained audio recordings of patient evaluations and doctor-patient conversations, along with physician-completed records detailing medications, allergies, complaint details, and clinical assessments. Some patient names were embedded directly in filenames, making identification trivial even without opening the files.
MedCall&rsquo;s clients included businesses across the transport sector, local government, and major franchise chains such as Piggly Wiggly, KFC, and Hampton Inn. The exposed records represented employees of these businesses who had undergone workers&rsquo; compensation evaluations or occupational health assessments through MedCall.
UpGuard notified MedCall CEO Randy Baker of the exposure via email on August 30, 2018, and by 9:30 AM the following day the S3 bucket had been secured. However, the situation worsened significantly when in October 2018, security researcher Britton White discovered a second misconfigured MedCall S3 bucket containing approximately 10,000 exposed files with similar sensitive content. This second bucket was again publicly accessible for download, editing, or deletion. DataBreaches.net notified MedCall of the second exposure, which was secured without acknowledgment from the company.
The double exposure highlighted systemic security failures at MedCall in managing cloud storage infrastructure and raised serious HIPAA compliance concerns given the highly sensitive nature of the protected health information involved. The incident affected approximately 150 businesses whose employees&rsquo; medical data was handled by MedCall as a third-party occupational health services provider.
Primary sources: <a href="https://www.upguard.com/breaches/how-medical-records-and-patient-doctor-recordings-were-exposed">https://www.upguard.com/breaches/how-medical-records-and-patient-doctor-recordings-were-exposed</a> and <a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/7gb-of-medical-data-publicly-exposed-thanks-to-misconfigured-aws-s3-bucket">https://www.bitdefender.com/en-us/blog/hotforsecurity/7gb-of-medical-data-publicly-exposed-thanks-to-misconfigured-aws-s3-bucket</a>]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.upguard.com/breaches/how-medical-records-and-patient-doctor-recordings-were-exposed</breach:sourceUrl><breach:dateOfBreach>2018-08-24</breach:dateOfBreach><breach:dateOfDisclosure>2018-09-04</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured AWS S3 bucket exposing 7GB of sensitive medical records and patient-doctor audio recordings</breach:initialAttackVector><breach:vendorProduct>MedCall Healthcare Advisors</breach:vendorProduct><breach:softwarePackage>Amazon Web Services S3</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>GoDaddy server configuration data exposed via misconfigured AWS S3 bucket (June–August 2018)</title><link>https://breachnotes.vulnetix.com/cloud/2018-08_godaddy-amazon-s3-bucket/</link><pubDate>Tue, 19 Jun 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-08_godaddy-amazon-s3-bucket/</guid><description>On June 19, 2018, researchers from UpGuard's Cyber Risk Team discovered a publicly accessible Amazon S3 bucket named "abbottgodaddy" that contained sensitive configuration and pricing data belonging to GoDaddy. The bucket had not been created by GoDaddy itself but by an AWS employee — specifically a …</description><content:encoded><![CDATA[<p>On June 19, 2018, researchers from UpGuard&rsquo;s Cyber Risk Team discovered a publicly accessible Amazon S3 bucket named &ldquo;abbottgodaddy&rdquo; that contained sensitive configuration and pricing data belonging to GoDaddy. The bucket had not been created by GoDaddy itself but by an AWS employee — specifically a salesperson — who had assembled the files while preparing prospective pricing scenarios for a GoDaddy cloud migration engagement.</p>
<p>Although Amazon S3 buckets default to private access restricted to the account owner, the salesperson failed to follow AWS best practices, leaving the bucket publicly readable. The exposure was discovered before any known malicious actor accessed the data, and UpGuard reported it to AWS, which secured the bucket.</p>
<p>The contents of the bucket included spreadsheets documenting the configurations of approximately 31,000 GoDaddy systems hosted on AWS infrastructure. The spreadsheet columns covered hostname, operating system, workload type, AWS region, memory, CPU specifications, and related technical details across 41 distinct fields per system entry. Additionally, the files contained detailed AWS pricing information, including the specific discounts and rates GoDaddy had negotiated — commercially sensitive data that could provide competitors with a negotiating advantage in their own AWS contract discussions.</p>
<p>While no customer personal data or credentials were exposed, the configuration map represented a detailed blueprint of GoDaddy&rsquo;s cloud infrastructure. An attacker who obtained this data could have used it to select high-value targets based on workload type, probable data classifications, system role, region, and scale — substantially reducing the reconnaissance effort required for a targeted intrusion.</p>
<p>The incident was notable because the misconfiguration originated with an AWS employee acting in a sales capacity, not with GoDaddy&rsquo;s own IT team. It illustrated how cloud vendor relationships and pre-sales activities can inadvertently create exposure points entirely outside the customer&rsquo;s visibility or control. GoDaddy was not directly responsible for the misconfiguration but bore the reputational and competitive risk from the disclosure.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.darkreading.com/cyberattacks-data-breaches/aws-employee-flub-exposes-s3-bucket-containing-godaddy-server-configuration-and-pricing-models</breach:sourceUrl><breach:dateOfBreach>2018-06-19</breach:dateOfBreach><breach:dateOfDisclosure>2018-08-11</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured Amazon S3 bucket created by an AWS salesperson with public read permissions — the bucket named "abbottgodaddy" was created to store pricing proposal documents for a GoDaddy AWS engagement and was not locked down to account-owner-only access as required by best practice</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services S3</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Krebs on Security</title><link>https://breachnotes.vulnetix.com/cloud/2018-01_reddit-mailgun/</link><pubDate>Thu, 14 Jun 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-01_reddit-mailgun/</guid><description>Between June 14 and June 18, 2018, an attacker compromised several Reddit employee accounts at the company's cloud hosting and source code hosting providers by intercepting SMS-based two-factor authentication codes. Reddit discovered the intrusion on June 19, 2018, and disclosed it publicly on …</description><content:encoded><![CDATA[Between June 14 and June 18, 2018, an attacker compromised several Reddit employee accounts at the company&rsquo;s cloud hosting and source code hosting providers by intercepting SMS-based two-factor authentication codes. Reddit discovered the intrusion on June 19, 2018, and disclosed it publicly on August 1, 2018. The attacker gained read-only access to systems containing backup data, source code, internal logs, and configuration files.
The most significant data exposed included a complete database backup from 2007 containing account credentials (usernames and salted hashed passwords) and email addresses for all Reddit users who registered between the site&rsquo;s 2005 launch and May 2007. The attacker also accessed email digest logs from June 3-17, 2018, which contained the email addresses of users subscribed to digest notifications, linking usernames to email addresses.
The supply-chain dimension involved Mailgun, Reddit&rsquo;s third-party email service provider used to send account-related emails such as password resets and email digests. While the primary attack vector was SMS interception of employee 2FA codes rather than a direct compromise of Mailgun itself, the breach exposed how Reddit&rsquo;s reliance on third-party cloud and hosting providers created attack surface when employee accounts protecting those services used weak SMS-based authentication rather than hardware token-based 2FA.
Reddit emphasized that the attacker did not gain write access to any systems and could not alter Reddit data. In response, Reddit required all employees to switch from SMS-based 2FA to token-based 2FA, enhanced internal logging, improved encryption of sensitive data, and rotated all production secrets and API keys. Affected users with active email addresses from the 2007 database were notified directly. The breach became a landmark case study in the inadequacy of SMS-based two-factor authentication, reinforcing NIST guidance that had already deprecated SMS as a second factor in 2016.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://krebsonsecurity.com/2018/08/reddit-breach-highlights-limits-of-sms-based-authentication/</breach:sourceUrl><breach:dateOfBreach>2018-06-14</breach:dateOfBreach><breach:dateOfDisclosure>2018-08-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2018-08-01</breach:dateOfCustomerNotification><breach:initialAttackVector>SMS interception bypassing two-factor authentication on employee cloud and source code hosting accounts</breach:initialAttackVector><breach:vendorProduct>Mailgun</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Mailgun</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Exactis Unprotected Elasticsearch Database (340M Consumer and Business Records)</title><link>https://breachnotes.vulnetix.com/cloud/2018-06_exactis-elasticsearch-340m/</link><pubDate>Fri, 01 Jun 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-06_exactis-elasticsearch-340m/</guid><description>Security researcher Vinnie Troia discovered in June 2018 that Exactis, a Florida-based data broker and marketing aggregation company, had left a 2-terabyte Elasticsearch database publicly accessible on the open internet with no authentication whatsoever. The database contained approximately 340 …</description><content:encoded>Security researcher Vinnie Troia discovered in June 2018 that Exactis, a Florida-based data broker and marketing aggregation company, had left a 2-terabyte Elasticsearch database publicly accessible on the open internet with no authentication whatsoever. The database contained approximately 340 million records — approximately 230 million US consumers and 110 million US businesses. While the database did not contain Social Security numbers or financial data, it contained extraordinarily detailed personal profiles compiled from public and commercial data sources: name, address, phone number, email address, age, estimated income, homeowner status, number of children and their ages, religious affiliation, political affiliation, interests and hobbies (hundreds of attributes per person), and hundreds of other personal characteristics. Troia notified Exactis and the database was secured. No evidence of prior unauthorized access was found, but the incident highlighted the privacy risks posed by the data broker industry — collecting and exposing detailed behavioral profiles on virtually every US adult without their knowledge or consent.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.wired.com/story/exactis-database-leaked-340-million-records/</breach:sourceUrl><breach:dateOfBreach>2018-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2018-06-27</breach:dateOfDisclosure><breach:initialAttackVector>Exactis, a data broker, left a 2TB Elasticsearch database publicly accessible on the open internet with no authentication required; discovered by security researcher Vinnie Troia</breach:initialAttackVector><breach:vendorProduct>Elasticsearch</breach:vendorProduct><breach:cloudProvider>Elasticsearch</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Bleeping Computer</title><link>https://breachnotes.vulnetix.com/cloud/2018-05_universal-music-group-agilisium/</link><pubDate>Wed, 30 May 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-05_universal-music-group-agilisium/</guid><description>On May 30, 2018, security researcher Bob Diachenko of Kromtech Security Center discovered an Apache Airflow server belonging to Agilisium, a cloud data contractor for Universal Music Group (UMG), that was publicly accessible on the internet without any password protection or authentication. Apache …</description><content:encoded><![CDATA[On May 30, 2018, security researcher Bob Diachenko of Kromtech Security Center discovered an Apache Airflow server belonging to Agilisium, a cloud data contractor for Universal Music Group (UMG), that was publicly accessible on the internet without any password protection or authentication. Apache Airflow is a workflow orchestration platform used to manage data pipelines and task scheduling across an organization.
The exposed server revealed highly sensitive credentials for UMG&rsquo;s IT infrastructure, including internal FTP server credentials, AWS secret access keys and passwords, SQL root passwords, and internal source code. With these credentials, an attacker could have gained deep access to UMG&rsquo;s cloud infrastructure, databases, and file servers, potentially accessing proprietary music content, business data, and internal systems.
The root cause was a misconfiguration by Agilisium during deployment of the Apache Airflow instance. By default, Apache Airflow does not enforce authentication on its web interface, requiring administrators to explicitly configure access controls. Agilisium failed to implement any authentication before deploying the server to a public-facing environment.
Diachenko contacted Universal Music Group, which quickly responded and resolved the issue by securing the exposed server. The incident was publicly disclosed in early June 2018. There was no evidence that malicious actors accessed the exposed credentials before the researcher&rsquo;s discovery, though the duration of the exposure was not determined.
The incident demonstrated a common cloud security failure pattern where third-party contractors deploy management and orchestration tools with default configurations that lack authentication. It also highlighted how a single misconfigured server at a contractor could expose credentials providing access to an entire organization&rsquo;s cloud infrastructure, making the blast radius of such misconfigurations far larger than the exposed server itself.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/contractor-exposes-credentials-for-universal-music-groups-it-infrastructure/</breach:sourceUrl><breach:dateOfBreach>2018-05-30</breach:dateOfBreach><breach:dateOfDisclosure>2018-06-05</breach:dateOfDisclosure><breach:initialAttackVector>Unsecured Apache Airflow server deployed by contractor without authentication</breach:initialAttackVector><breach:vendorProduct>Agilisium</breach:vendorProduct><breach:softwarePackage>Apache Airflow</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>PageUp HR SaaS Breach — Australia, Used by Telstra, NAB, Coles, Australian Government</title><link>https://breachnotes.vulnetix.com/cloud/2018-05_pageup-hr-saas-australia/</link><pubDate>Wed, 23 May 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-05_pageup-hr-saas-australia/</guid><description>On June 1, 2018, PageUp — an Australian HR software company whose recruitment platform is used by over 100 Australian and international enterprises — disclosed that it had detected unauthorized access and malware on its systems on May 23, 2018. PageUp's platform is used for recruitment and HR …</description><content:encoded>On June 1, 2018, PageUp — an Australian HR software company whose recruitment platform is used by over 100 Australian and international enterprises — disclosed that it had detected unauthorized access and malware on its systems on May 23, 2018. PageUp&amp;rsquo;s platform is used for recruitment and HR management by major Australian organizations including Telstra, National Australia Bank (NAB), Coles, Australia Post, Linfox, Medibank, and numerous Australian government departments. The malware potentially exposed data of hundreds of thousands of current and former job applicants, including names, email addresses, physical addresses, phone numbers, employment history, and potentially referee details. PageUp stated that employee records and data stored in its HR management modules beyond the recruitment system were not believed to have been affected. Numerous major employers — including Telstra, NAB, Coles, and the Australian government — suspended use of PageUp&amp;rsquo;s services or issued precautionary notifications to applicants. The Australian Cyber Security Centre (ACSC) issued an alert. PageUp&amp;rsquo;s global client base extended to the UK, USA, and other countries. The company engaged external forensic firm KPMG and stated it found no evidence that data had been exfiltrated, though this could not be definitively confirmed given the nature of the malware. PageUp resumed services after implementing remediation measures. The breach was significant as an early high-profile example of an HR SaaS supply chain incident affecting multiple large organizations through a single vendor compromise.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.abc.net.au/news/2018-06-06/pageup-data-breach-what-we-know/9839618</breach:sourceUrl><breach:dateOfBreach>2018-05-23</breach:dateOfBreach><breach:dateOfDisclosure>2018-06-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2018-06-01</breach:dateOfCustomerNotification><breach:initialAttackVector>Malware infection of PageUp's systems; PageUp detected unusual activity on May 23, 2018 and confirmed malware had compromised some of its infrastructure; the precise initial intrusion vector (e.g., spearphishing, unpatched vulnerability) was not publicly disclosed</breach:initialAttackVector><breach:vendorProduct>PageUp (Australian HR and recruitment SaaS platform)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>PageUp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>PageUp People HR SaaS Platform Breach — Australian HR Vendor Affecting 100+ Employers</title><link>https://breachnotes.vulnetix.com/cloud/2018-05_pageup-hr-platform-breach/</link><pubDate>Wed, 23 May 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-05_pageup-hr-platform-breach/</guid><description>In May 2018, PageUp People — a Melbourne-based HR and recruitment software company with clients across Australia, UK, US, Canada, and other countries — discovered unusual activity in its IT systems suggesting a malware-based compromise. PageUp disclosed the breach on 5 June 2018, prompting over 100 …</description><content:encoded>In May 2018, PageUp People — a Melbourne-based HR and recruitment software company with clients across Australia, UK, US, Canada, and other countries — discovered unusual activity in its IT systems suggesting a malware-based compromise. PageUp disclosed the breach on 5 June 2018, prompting over 100 employer clients to suspend their use of PageUp and notify job applicants and employees. Major Australian employers affected included Telstra, Linfox, Reserve Bank of Australia, Aldi, Medibank, Target Australia, and the Australian government. UK clients included the BBC, Oxfam, and several UK government departments. The data potentially exposed included applicant details (names, addresses, dates of birth, email addresses, telephone numbers, employment history, academic qualifications), employee data, and reference information. PageUp stated that encrypted credit card data (not stored by PageUp), references, and documents were not compromised. PageUp notified the OAIC under Australia&amp;rsquo;s new mandatory Notifiable Data Breaches scheme (which had only come into effect in February 2018 — the PageUp breach was one of the first major cases under the new regime). The OAIC and UK ICO both investigated. The incident highlighted the risk of HR platform supply chains and the breadth of downstream impact when a single SaaS recruitment platform is compromised — affecting hundreds of thousands of job applicants across dozens of major organisations simultaneously.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.oaic.gov.au/updates/news-and-media/pageup-data-breach-information-for-affected-individuals</breach:sourceUrl><breach:dateOfBreach>2018-05-23</breach:dateOfBreach><breach:dateOfDisclosure>2018-06-05</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2018-06-05</breach:dateOfCustomerNotification><breach:initialAttackVector>Unknown attacker compromised PageUp People's cloud-based HR and recruitment platform; PageUp described it as unusual activity in its IT infrastructure suggesting a malware infection; the platform stored candidate and employee data for over 100 Australian and global employers</breach:initialAttackVector><breach:vendorProduct>PageUp People HR recruitment SaaS platform</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>PageUp</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Chegg S3 Root Credentials Data Breach (40M Users)</title><link>https://breachnotes.vulnetix.com/cloud/2018-09_chegg-s3-root-credentials/</link><pubDate>Sun, 01 Apr 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-09_chegg-s3-root-credentials/</guid><description>In April 2018, Chegg, an American education technology company, suffered a data breach when a contract worker used Chegg's AWS root account credentials — which had been shared widely within the company — to access an S3 bucket and steal data for approximately 40 million users. The use of root …</description><content:encoded>In April 2018, Chegg, an American education technology company, suffered a data breach when a contract worker used Chegg&amp;rsquo;s AWS root account credentials — which had been shared widely within the company — to access an S3 bucket and steal data for approximately 40 million users. The use of root account credentials and shared access keys rather than individual IAM accounts with least-privilege permissions was a fundamental security failure. Chegg didn&amp;rsquo;t discover the breach until it was disclosed in September 2018. The breach exposed user names, email addresses, hashed passwords, and scholarship application data. In 2022, the FTC took enforcement action against Chegg for this and three subsequent breaches (2018-2020), finding a pattern of poor security practices including storing sensitive data in plaintext in S3, sharing AWS root credentials, and failing to patch known vulnerabilities. The FTC order required Chegg to implement a comprehensive security program, data minimization, and multi-factor authentication.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.ftc.gov/legal-library/browse/cases-proceedings/2023061-chegg-inc</breach:sourceUrl><breach:dateOfBreach>2018-04-01</breach:dateOfBreach><breach:dateOfDisclosure>2018-09-25</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2018-10-01</breach:dateOfCustomerNotification><breach:initialAttackVector>A contract worker with knowledge of the credentials used Chegg's AWS root account credentials and shared access keys to access an S3 bucket containing user data, exfiltrating records for 40 million users</breach:initialAttackVector><breach:vendorProduct>Amazon S3; Amazon Web Services</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>LA Times Publicly Accessible S3 Bucket Cryptomining Attack</title><link>https://breachnotes.vulnetix.com/cloud/2018-02_la-times-s3-cryptomining/</link><pubDate>Fri, 09 Feb 2018 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2018-02_la-times-s3-cryptomining/</guid><description>In February 2018, the LA Times' Homicide Report website was discovered to be running Coinhive cryptocurrency mining code injected by attackers who had exploited a publicly writable Amazon S3 bucket. The S3 bucket hosting the web application's static files had been misconfigured to allow public write …</description><content:encoded>In February 2018, the LA Times&amp;rsquo; Homicide Report website was discovered to be running Coinhive cryptocurrency mining code injected by attackers who had exploited a publicly writable Amazon S3 bucket. The S3 bucket hosting the web application&amp;rsquo;s static files had been misconfigured to allow public write access, enabling anyone to modify the hosted JavaScript files. Attackers injected a Coinhive Monero miner that ran in the browsers of all visitors to the Homicide Report page. A security researcher discovered the compromise on February 9; the LA Times fixed it on February 22 after notification. While no user data was directly exfiltrated, the incident was an early high-profile example of the cryptojacking threat and the risks of publicly writable S3 buckets — a misconfiguration that also affects integrity of hosted content.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/la-times-website-infected-with-cryptomining-malware/</breach:sourceUrl><breach:dateOfBreach>2018-02-09</breach:dateOfBreach><breach:dateOfDisclosure>2018-02-22</breach:dateOfDisclosure><breach:initialAttackVector>LA Times' Amazon S3 bucket hosting the Homicide Report web application was publicly writable due to misconfigured S3 ACLs; attackers injected Coinhive cryptocurrency mining JavaScript into the page</breach:initialAttackVector><breach:vendorProduct>Amazon S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Imperva RDS Database Snapshot Publicly Exposed (Cloud WAF Customer Data)</title><link>https://breachnotes.vulnetix.com/cloud/2019-08_imperva-rds-snapshot-exposure/</link><pubDate>Sun, 01 Oct 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-08_imperva-rds-snapshot-exposure/</guid><description>Imperva, a cybersecurity company providing cloud-based web application firewall (WAF) and DDoS protection services, disclosed in August 2019 that a data breach had exposed customer data for its Cloud WAF (formerly Incapsula) product. The breach originated from an October 2017 database migration in …</description><content:encoded>Imperva, a cybersecurity company providing cloud-based web application firewall (WAF) and DDoS protection services, disclosed in August 2019 that a data breach had exposed customer data for its Cloud WAF (formerly Incapsula) product. The breach originated from an October 2017 database migration in which an Amazon RDS database snapshot was inadvertently made publicly accessible. An unknown third party subsequently discovered and accessed the snapshot. The exposed data included email addresses, hashed and salted passwords, API keys, and TLS/SSL certificates belonging to Imperva&amp;rsquo;s Cloud WAF customers. The irony of a cybersecurity company suffering a breach through basic cloud misconfiguration attracted significant industry attention. Imperva&amp;rsquo;s own post-mortem identified the root cause as an unintended public RDS snapshot created during infrastructure migration — a misconfiguration that went undetected for nearly two years. The incident is cited as a case study in cloud security and the importance of regular cloud configuration auditing.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.imperva.com/blog/cybersecurity-lessons-learned-from-the-2019-imperva-data-breach/</breach:sourceUrl><breach:dateOfBreach>2017-10-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-08-27</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2019-10-10</breach:dateOfCustomerNotification><breach:initialAttackVector>Imperva's internal database migration process created an Amazon RDS snapshot and made it publicly accessible; the snapshot contained customer authentication tokens, password hashes, and API keys. An attacker later found and accessed this snapshot</breach:initialAttackVector><breach:vendorProduct>Amazon RDS (Relational Database Service)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:rds:{region}:{account}:snapshot:{id}</breach:cloudResourceCrit></item><item><title>Verizon Customer Records Exposed via NICE Systems Misconfigured S3 Bucket</title><link>https://breachnotes.vulnetix.com/cloud/2017-07_verizon-nice-systems/</link><pubDate>Thu, 08 Jun 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-07_verizon-nice-systems/</guid><description>On June 8, 2017, UpGuard cyber risk analyst Chris Vickery discovered a publicly accessible Amazon S3 storage bucket owned and operated by NICE Systems, an Israeli telephonic software and data analytics firm that served as a third-party vendor for Verizon's customer service operations. The repository …</description><content:encoded>On June 8, 2017, UpGuard cyber risk analyst Chris Vickery discovered a publicly accessible Amazon S3 storage bucket owned and operated by NICE Systems, an Israeli telephonic software and data analytics firm that served as a third-party vendor for Verizon&amp;rsquo;s customer service operations. The repository contained up to 14 million Verizon customer records, though Verizon disputed this figure and claimed only 6 million customers were affected.
The S3 bucket was configured to allow public access and was downloadable by anyone who could guess the relatively simple URL. The exposed data included customer names, addresses, phone numbers, account details, and critically, account PIN codes that customers used to verify their identity when calling Verizon&amp;rsquo;s phone-based customer service. The exposure of PINs was particularly dangerous because it could allow attackers to impersonate customers and take over their accounts.
Vickery notified Verizon of the exposure on June 13, 2017, but the bucket was not secured until June 22, leaving a nine-day window after notification during which the data remained publicly accessible. The total period of exposure before discovery is unknown. The incident was publicly reported on July 12, 2017, by multiple news outlets after UpGuard published its findings.
NICE Systems had been collecting the data as part of its work providing customer service analytics for Verizon. The data appeared to have been generated as part of logging and analytics for Verizon&amp;rsquo;s customer call center operations, capturing information from customer interactions.
The incident became one of the most prominent examples of third-party cloud misconfiguration risk in 2017, a year that saw numerous high-profile S3 bucket exposures. It demonstrated that even large enterprises with mature security programs could have their customer data exposed through vendor misconfigurations over which they had no direct control. The exposure of account PINs alongside personal information elevated this beyond a typical data leak, creating a direct path to account takeover for any of the millions of affected Verizon subscribers.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.upguard.com/breaches/verizon-cloud-leak</breach:sourceUrl><breach:dateOfBreach>2017-06-08</breach:dateOfBreach><breach:dateOfDisclosure>2017-07-12</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured Amazon S3 bucket left publicly accessible without authentication</breach:initialAttackVector><breach:vendorProduct>NICE Systems</breach:vendorProduct><breach:softwarePackage>Amazon S3</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Deep Root Analytics 2016 Voter Data Exposure — 198 Million Americans</title><link>https://breachnotes.vulnetix.com/cloud/2017-06_deep-root-analytics-198m-voters/</link><pubDate>Thu, 01 Jun 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-06_deep-root-analytics-198m-voters/</guid><description>In June 2017, UpGuard cybersecurity researcher Chris Vickery discovered an Amazon S3 bucket belonging to Deep Root Analytics — a data analytics firm that had been contracted by the Republican National Committee (RNC) for the 2016 presidential campaign — that was publicly accessible without …</description><content:encoded>In June 2017, UpGuard cybersecurity researcher Chris Vickery discovered an Amazon S3 bucket belonging to Deep Root Analytics — a data analytics firm that had been contracted by the Republican National Committee (RNC) for the 2016 presidential campaign — that was publicly accessible without authentication. The bucket contained 1.1 terabytes of data on approximately 198 million Americans — nearly every registered US voter — compiled from a variety of sources including voter registration rolls, commercial data, and political analytics. The data included names, dates of birth, home addresses, phone numbers, voter registration details, and highly granular political scoring data: ethnicity modeling, party affiliation, stance on issues including gun control, stem cell research, and 46 other modeled issue positions. The data had been compiled for campaign microtargeting purposes. Deep Root Analytics confirmed the exposure, acknowledging it was their data and that it was their mistake. The company stated the information is available to the public but should not have been stored this way. The discovery was made just weeks after similar exposures from Republican analytics firms RNC&amp;rsquo;s DataTrust and Targeted Victory. The incident highlighted the risks of political data brokers holding extensive voter databases and the inadequacy of AWS S3 access control practices.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.upguard.com/breaches/the-rnc-files</breach:sourceUrl><breach:dateOfBreach>2017-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2017-06-19</breach:dateOfDisclosure><breach:initialAttackVector>Deep Root Analytics, a data analytics firm contracted by the Republican National Committee, misconfigured an Amazon S3 bucket that was set to public access; the bucket contained detailed voter data compiled from multiple sources including publicly available voter registration records, proprietary commercial data, and political modeling scores</breach:initialAttackVector><breach:vendorProduct>Deep Root Analytics AWS S3 bucket</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>UpGuard</title><link>https://breachnotes.vulnetix.com/cloud/2017-06_republican-national-committee-deep-root/</link><pubDate>Thu, 01 Jun 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-06_republican-national-committee-deep-root/</guid><description>On June 12, 2017, UpGuard cyber risk analyst Chris Vickery discovered a publicly accessible Amazon S3 cloud storage bucket containing approximately 1.1 terabytes of data on 198 million American voters, representing virtually every registered voter in the United States. The data belonged to Deep Root …</description><content:encoded>On June 12, 2017, UpGuard cyber risk analyst Chris Vickery discovered a publicly accessible Amazon S3 cloud storage bucket containing approximately 1.1 terabytes of data on 198 million American voters, representing virtually every registered voter in the United States. The data belonged to Deep Root Analytics (DRA), a Republican data analytics firm contracted by the Republican National Committee (RNC) for voter modeling and targeting during the 2016 election cycle.
The exposed database contained names, dates of birth, home addresses, phone numbers, voter registration details, and sophisticated algorithmic predictions about each voter&amp;rsquo;s likely positions on 48 different policy issues including gun ownership, stem cell research, the right to die, and the Trans-Pacific Partnership. The data combined information from multiple sources, including voter files, consumer data, and Reddit posting histories, to build detailed psychographic profiles for political targeting purposes.
The S3 bucket had no password protection, no access controls, and was fully downloadable by anyone with the URL. Vickery notified federal authorities and Deep Root Analytics on June 12. DRA secured the bucket on June 14, and the exposure was publicly disclosed on June 19, 2017. Deep Root Analytics acknowledged the misconfiguration and stated that access settings had been inadvertently changed on June 1, meaning the data was publicly exposed for approximately two weeks.
Deep Root Analytics issued a statement accepting responsibility and confirming they had updated access settings and implemented a protocol to prevent future misconfigurations. The firm was the subject of a class action lawsuit filed on behalf of affected voters. The RNC stated it had not been aware of the exposure and emphasized that the data was maintained by the contractor, not the RNC directly.
The incident was the largest known exposure of voter data in US history at the time and highlighted the security risks of concentrating massive personal datasets with political data vendors. It raised significant concerns about the lack of federal data protection requirements for political organizations and their contractors, as voter data is not covered by major privacy regulations like HIPAA or financial data protection laws.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.upguard.com/breaches/the-rnc-files</breach:sourceUrl><breach:dateOfBreach>2017-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2017-06-19</breach:dateOfDisclosure><breach:initialAttackVector>Unsecured Amazon S3 bucket with no access controls or authentication</breach:initialAttackVector><breach:vendorProduct>Deep Root Analytics</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Verizon Customer Data Exposure via NICE Systems — 14 Million Records on AWS S3</title><link>https://breachnotes.vulnetix.com/cloud/2017-06_verizon-nice-systems-s3-14m/</link><pubDate>Thu, 01 Jun 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-06_verizon-nice-systems-s3-14m/</guid><description>In July 2017, UpGuard security researchers discovered that NICE Systems — an enterprise software company contracted by Verizon to manage call center quality assurance — had left an Amazon S3 bucket containing approximately 14 million Verizon customer records publicly accessible without …</description><content:encoded>In July 2017, UpGuard security researchers discovered that NICE Systems — an enterprise software company contracted by Verizon to manage call center quality assurance — had left an Amazon S3 bucket containing approximately 14 million Verizon customer records publicly accessible without authentication. The bucket contained records from Verizon&amp;rsquo;s customer call center operations, apparently collected and stored by NICE Systems as part of call monitoring and quality assurance services. Exposed data included names, addresses, account numbers, PIN codes (used for account authentication), and call recordings metadata. The exposure was particularly serious because PINs could be used to bypass Verizon&amp;rsquo;s customer service authentication and take over accounts. UpGuard notified Verizon, which worked with NICE Systems to secure the bucket. Verizon confirmed the exposure but disputed the scope, stating approximately 6 million customers were affected and that PINs were stored in encrypted form for some records. NICE Systems was contracted specifically to handle call center data — making this a third-party data handling breach consistent with growing supply chain risk in telecom customer service outsourcing. The incident occurred during growing attention to S3 misconfiguration breaches, which affected numerous major companies in 2017-2018 including Dow Jones, Booz Allen Hamilton, and the Pentagon.</content:encoded><category>cloud</category><breach:sourceUrl>https://mackeepersecurity.com/post/verizon-communications-14-million-customers-data-exposed-on-amazon-s3/</breach:sourceUrl><breach:dateOfBreach>2017-06-01</breach:dateOfBreach><breach:dateOfDisclosure>2017-07-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-07-12</breach:dateOfCustomerNotification><breach:initialAttackVector>NICE Systems — an Israel-based enterprise software company contracted by Verizon for call center quality improvement — misconfigured an Amazon S3 bucket to be publicly accessible; the bucket contained customer account data from Verizon's customer call center operations</breach:initialAttackVector><breach:vendorProduct>NICE Systems AWS S3 bucket (Verizon customer data)</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>OneLogin Single Sign-On Breach — Customer Data Decrypted by Attacker</title><link>https://breachnotes.vulnetix.com/cloud/2017-05_onelogin-aws-decryption-breach/</link><pubDate>Wed, 31 May 2017 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-05_onelogin-aws-decryption-breach/</guid><description>On 31 May 2017, OneLogin — an enterprise single sign-on and identity management provider serving approximately 2,000 enterprise customers — suffered a breach in which an attacker obtained and used AWS access keys to access OneLogin's US data region. The attacker was able to use the AWS API access to …</description><content:encoded><![CDATA[On 31 May 2017, OneLogin — an enterprise single sign-on and identity management provider serving approximately 2,000 enterprise customers — suffered a breach in which an attacker obtained and used AWS access keys to access OneLogin&rsquo;s US data region. The attacker was able to use the AWS API access to access encrypted customer data and obtain decryption keys, giving them access to plaintext customer data including OneLogin&rsquo;s customer data, apps, and their own secrets (which are managed through OneLogin&rsquo;s platform). OneLogin disclosed the breach the same day it was detected and immediately terminated the attacker&rsquo;s access. The breach was particularly serious because OneLogin serves as a single sign-on provider — meaning that compromised OneLogin credentials or secrets could cascade to provide access to all applications that customers use OneLogin to authenticate with. OneLogin warned all affected customers that the threat actor may be able to decrypt encrypted data as the attacker may have obtained the ability to decrypt data. OneLogin advised all customers to generate new API credentials, OAuth tokens, and security certificates, and to recycle all secrets stored in OneLogin&rsquo;s Secure Notes. The breach highlighted the critical nature of identity provider security and the catastrophic impact of a breach affecting an SSO platform used across thousands of enterprise applications.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.onelogin.com/blog/may-31-2017-security-incident</breach:sourceUrl><breach:dateOfBreach>2017-05-31</breach:dateOfBreach><breach:dateOfDisclosure>2017-05-31</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-05-31</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker obtained access keys to the AWS platform used by OneLogin's US data region via an unknown mechanism, then used those keys to create AWS API calls to enumerate OneLogin's infrastructure and access customer data; the attacker used AWS API access to decrypt data stored in OneLogin's environment</breach:initialAttackVector><breach:vendorProduct>OneLogin single sign-on / identity management platform</breach:vendorProduct><breach:cloudProvider>OneLogin</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Zendesk 2016 Breach Disclosed 2019 (Uber, Slack, FCC Affected)</title><link>https://breachnotes.vulnetix.com/cloud/2019-10_uber-slack-and-fcc-zendesk/</link><pubDate>Tue, 01 Nov 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2019-10_uber-slack-and-fcc-zendesk/</guid><description>In October 2019, Zendesk — a major customer service software platform used by over 145,000 organizations — disclosed a security breach that affected customer accounts created before November 2016. The underlying incident itself had occurred in 2016, making this a significant case of delayed breach …</description><content:encoded>In October 2019, Zendesk — a major customer service software platform used by over 145,000 organizations — disclosed a security breach that affected customer accounts created before November 2016. The underlying incident itself had occurred in 2016, making this a significant case of delayed breach discovery and notification, with a gap of roughly three years between breach and disclosure.
On September 24, 2019, Zendesk determined — after being alerted by a third party — that information belonging to a subset of its customers had been accessed without authorization. Approximately 10,000 Zendesk Support and Chat accounts were affected, including expired trial accounts and accounts no longer active.
The data accessed included: email addresses, names, and phone numbers of agents and end-users associated with affected accounts, as well as hashed and salted passwords for agents and end-users from before November 2016. Zendesk found no evidence that actual support ticket content was accessed in connection with this incident.
The impact extended far beyond Zendesk itself because its customer support platform is used by high-profile organizations that store sensitive support interactions. Affected customers included Uber, Slack, Shopify, Airbnb, and government entities such as the FCC (Federal Communications Commission). These downstream organizations were notified and in turn had to assess whether their own customers and end-users were at risk from the agent/end-user data that had been accessed.
Zendesk published a security update at zendesk.com/blog/security-update-2019/ confirming the breach related to the 2016 incident and encouraged affected customers to require password resets for users whose credentials may have been included in the exposed data.
This incident illustrates a compounding supply-chain risk: a single breach at a SaaS customer-service provider exposed agent and user databases of thousands of downstream enterprise clients simultaneously, many of which handled sensitive customer interactions through the platform. The three-year gap before disclosure raised questions about how quickly breaches of this type are discovered in multi-tenant SaaS environments.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/zendesk-security-breach-may-impact-orgs-like-uber-slack-and-fcc/</breach:sourceUrl><breach:dateOfBreach>2016-11-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-10-02</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2019-10-02</breach:dateOfCustomerNotification><breach:initialAttackVector>Unauthorized access to Zendesk Support and Chat customer account databases; breach originated in 2016 and disclosed to affected customers in October 2019</breach:initialAttackVector><breach:vendorProduct>Zendesk Support and Chat</breach:vendorProduct><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>Zendesk</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>Uber 2016 Data Breach and Cover-Up (57 Million Users)</title><link>https://breachnotes.vulnetix.com/cloud/2017-10_uber-github/</link><pubDate>Thu, 13 Oct 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-10_uber-github/</guid><description>In October 2016, two hackers used credential stuffing to access Uber engineers' private GitHub repositories, leveraging passwords exposed in previous data breaches. Uber did not require multi-factor authentication on GitHub accounts, making this attack trivial. Within the repositories, the hackers …</description><content:encoded><![CDATA[In October 2016, two hackers used credential stuffing to access Uber engineers&rsquo; private GitHub repositories, leveraging passwords exposed in previous data breaches. Uber did not require multi-factor authentication on GitHub accounts, making this attack trivial. Within the repositories, the hackers discovered AWS access keys stored in plaintext that granted full administrative privileges to Uber&rsquo;s Amazon S3 data stores.
Between October 13 and November 15, 2016, the attackers downloaded 16 unencrypted database backup files from S3 containing approximately 25.6 million names and email addresses, 22.1 million names and mobile phone numbers, and 607,000 names and driver&rsquo;s license numbers, totaling roughly 57 million Uber users and drivers worldwide.
On November 14, 2016, the hackers contacted Uber&rsquo;s Chief Security Officer Joe Sullivan directly via email, demanding a ransom. Rather than reporting the breach to regulators or affected users, Sullivan orchestrated a cover-up. He told a subordinate &ldquo;we can&rsquo;t let this get out&rdquo; and arranged to pay the hackers $100,000 in Bitcoin in December 2016, disguising the payment as a bug bounty reward and requiring the hackers to sign non-disclosure agreements, despite the fact that they refused to provide their real names. Sullivan also concealed the breach from the Federal Trade Commission, which was actively investigating Uber over a separate 2014 data breach at the time.
The cover-up unraveled in November 2017 when new Uber CEO Dara Khosrowshahi, who had replaced Travis Kalanick, disclosed the breach publicly. Sullivan was fired and subsequently indicted by federal prosecutors. In October 2022, a federal jury convicted Sullivan of obstruction of FTC proceedings and misprision of a felony, making him the first corporate security executive to face criminal conviction for a breach cover-up. In May 2023, Sullivan was sentenced to three years of probation and a $50,000 fine. His conviction was upheld on appeal by the Ninth Circuit in 2025.
The two hackers, Brandon Glover and Vasile Mereacre, pleaded guilty in 2019. The case became a landmark in cybersecurity governance, establishing that security executives bear personal criminal liability for concealing breaches from regulators.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-convicted-federal-charges-covering-data-breach</breach:sourceUrl><breach:dateOfBreach>2016-10-13</breach:dateOfBreach><breach:dateOfDisclosure>2017-11-21</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-11-21</breach:dateOfCustomerNotification><breach:initialAttackVector>Credential stuffing attack on Uber engineers' GitHub accounts using passwords from prior breaches; AWS access keys found in private repositories</breach:initialAttackVector><breach:vendorProduct>GitHub</breach:vendorProduct><breach:softwarePackage>Amazon S3</breach:softwarePackage><breach:supplyChainClaimed>true</breach:supplyChainClaimed><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>NPR / DOJ / TechCrunch / Washington Post</title><link>https://breachnotes.vulnetix.com/cloud/2016-10_uber-cover-up/</link><pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2016-10_uber-cover-up/</guid><description>Attackers found Uber AWS credentials in GitHub and downloaded data affecting 57M users and drivers (names, emails, phone numbers; 600K US driver license numbers). Uber CSO Joe Sullivan paid hackers $100K in Bitcoin as bug bounty under NDA to conceal breach. Breach not disclosed to FTC (which had …</description><content:encoded>Attackers found Uber AWS credentials in GitHub and downloaded data affecting 57M users and drivers (names, emails, phone numbers; 600K US driver license numbers). Uber CSO Joe Sullivan paid hackers $100K in Bitcoin as bug bounty under NDA to conceal breach. Breach not disclosed to FTC (which had ongoing data security settlement with Uber at time). Cover-up discovered by new CEO. Sullivan convicted Oct 2022 of obstruction of justice. Uber paid $148M to 50 states in 2018 settlement.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.justice.gov/usao-ndca/pr/former-chief-security-officer-uber-convicted-federal-charges-covering-data-breach</breach:sourceUrl><breach:dateOfBreach>2016-10-01</breach:dateOfBreach><breach:dateOfDisclosure>2017-11-21</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-11-21</breach:dateOfCustomerNotification><breach:initialAttackVector>CWE-312: Cleartext Storage of Sensitive Information (AWS credentials exposed in GitHub repository, used to access S3 bucket with customer data)</breach:initialAttackVector><breach:vendorProduct>Uber / AWS S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Uber AWS GitHub Credentials Theft — 57 Million Riders and Drivers, $148M Settlement</title><link>https://breachnotes.vulnetix.com/cloud/2016-10_uber-github-aws-credentials/</link><pubDate>Sat, 01 Oct 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2016-10_uber-github-aws-credentials/</guid><description>In October-November 2016, two attackers discovered that Uber's private GitHub code repository contained hardcoded AWS credentials. Using those credentials, they accessed an AWS S3 bucket containing a database archive with personal data for 57 million Uber users (50 million riders worldwide and 7 …</description><content:encoded><![CDATA[In October-November 2016, two attackers discovered that Uber&rsquo;s private GitHub code repository contained hardcoded AWS credentials. Using those credentials, they accessed an AWS S3 bucket containing a database archive with personal data for 57 million Uber users (50 million riders worldwide and 7 million drivers). Driver&rsquo;s license numbers for approximately 600,000 US drivers were also exposed. The attackers contacted Uber and demanded payment to delete the data. Uber paid $100,000 in Bitcoin to the attackers through its bug bounty program (using a third-party facilitated by Uber&rsquo;s security team) and obtained confirmation that the data was deleted — though Uber could not verify this. Critically, Uber&rsquo;s then-CSO Joe Sullivan and a colleague actively concealed the breach from the FTC (which was already investigating Uber&rsquo;s 2014 data security practices), from regulators, and from the public for over a year. The breach was disclosed a year later in November 2017, after new Uber CEO Dara Khosrowshahi discovered and disclosed it. The concealment resulted in criminal charges: Joe Sullivan was convicted in 2022 on charges of obstruction of justice and misprision of a felony — the first criminal conviction of a corporate security executive for concealing a breach. Uber paid $148 million to settle investigations by all 50 US state attorneys general. The FTC imposed additional oversight requirements. Sullivan was sentenced to three years of probation in May 2023.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.ftc.gov/news-events/news/press-releases/2018/10/uber-agrees-expanded-settlement-ftc-related-data-cover</breach:sourceUrl><breach:dateOfBreach>2016-10-01</breach:dateOfBreach><breach:dateOfDisclosure>2017-11-21</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-11-21</breach:dateOfCustomerNotification><breach:initialAttackVector>Attackers found Uber's private GitHub repository containing hardcoded AWS credentials; used those credentials to access an AWS S3 bucket containing a backup archive with rider and driver personal data; attackers contacted Uber and demanded $100,000 in exchange for deleting the data</breach:initialAttackVector><breach:vendorProduct>Uber private GitHub repository / AWS S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Cloudflare Cloudbleed Memory Leak — OAuth Tokens, Passwords, Private Keys Exposed</title><link>https://breachnotes.vulnetix.com/cloud/2017-02_cloudflare-cloudbleed-memory-leak/</link><pubDate>Thu, 22 Sep 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2017-02_cloudflare-cloudbleed-memory-leak/</guid><description>On 22 September 2016, Cloudflare deployed a change to its HTML parsing pipeline that introduced a buffer overread bug (named 'Cloudbleed' by researcher Tavis Ormandy, in reference to Heartbleed). The bug caused Cloudflare's edge servers to include uninitialized memory — containing data from other …</description><content:encoded><![CDATA[On 22 September 2016, Cloudflare deployed a change to its HTML parsing pipeline that introduced a buffer overread bug (named &lsquo;Cloudbleed&rsquo; by researcher Tavis Ormandy, in reference to Heartbleed). The bug caused Cloudflare&rsquo;s edge servers to include uninitialized memory — containing data from other Cloudflare customers&rsquo; HTTP requests — in HTTP responses. This data included session cookies, authentication tokens, OAuth tokens, passwords in cleartext, private API keys, TLS private key material, and full HTTP request/response bodies from numerous Cloudflare-proxied websites. Tavis Ormandy of Google Project Zero discovered the issue on 17 February 2017 while investigating memory corruption in search results and notified Cloudflare. Cloudflare patched the bug within hours of notification (18 February 2017) but did not publicly disclose until 23 February. The period of maximum leakage was 13-18 February 2017, though lower-rate leakage occurred from September 2016. The leaked data had been cached by Google, Bing, Yahoo, and other search engines in their caches. Cloudflare worked with the major search engines to purge approximately 770 unique URLs containing leaked data from public caches. Approximately 3,438 Cloudflare customer domains were identified as having been directly active in triggering the overflow. Potentially affected downstream user data spanned millions of users across thousands of websites. The incident affected major Cloudflare customers including Uber, OKCupid, 1Password, FitBit, and others. Despite the severity, no confirmed large-scale exploitation by malicious actors was discovered, though the search engine caching meant sensitive data was potentially publicly accessible for months. Cloudflare estimated the leak rate was approximately 1 in every 3,300,000 HTTP requests.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/</breach:sourceUrl><breach:dateOfBreach>2016-09-22</breach:dateOfBreach><breach:dateOfDisclosure>2017-02-23</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2017-02-23</breach:dateOfCustomerNotification><breach:initialAttackVector>A bug in Cloudflare's HTML parser (introduced 22 September 2016) caused the parser to read past the end of a buffer when processing certain HTML constructs (including server-side includes, email obfuscation, and automatic HTTPS rewrites); the overrun memory contained data from other Cloudflare customers' HTTP requests including authentication tokens, session cookies, passwords, and private messages — this data was served in HTTP responses to users and cached by Google, Bing, and other search engines</breach:initialAttackVector><breach:vendorProduct>Cloudflare reverse proxy / CDN / security service</breach:vendorProduct><breach:cloudProvider>Cloudflare</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>DataDog AWS Access Keys Exposed in Breach</title><link>https://breachnotes.vulnetix.com/cloud/2016-07_datadog-aws-access-keys/</link><pubDate>Thu, 07 Jul 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2016-07_datadog-aws-access-keys/</guid><description>On July 7-8, 2016, DataDog, a cloud monitoring and analytics platform, detected unauthorized access to its internal systems and discovered that AWS access keys had been exposed. DataDog immediately rotated all credentials and notified customers. Because DataDog agents run with IAM permissions inside …</description><content:encoded>On July 7-8, 2016, DataDog, a cloud monitoring and analytics platform, detected unauthorized access to its internal systems and discovered that AWS access keys had been exposed. DataDog immediately rotated all credentials and notified customers. Because DataDog agents run with IAM permissions inside customer AWS environments, the potential exposure of these keys raised concerns about downstream access to customer cloud infrastructure. DataDog stated it found no evidence that customer data was accessed. The company&amp;rsquo;s rapid response — detection and notification within approximately 24 hours — was noted as a positive example of breach response.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.datadoghq.com/blog/2016-07-08-security-notice/</breach:sourceUrl><breach:dateOfBreach>2016-07-07</breach:dateOfBreach><breach:dateOfDisclosure>2016-07-08</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2016-07-08</breach:dateOfCustomerNotification><breach:initialAttackVector>An attacker gained access to DataDog's internal systems and obtained AWS access keys, which could have been used to access customer AWS environments where the DataDog agent was installed</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (AWS)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:iam::{account}:access-key</breach:cloudResourceCrit></item><item><title>Vitagene Unprotected S3 Buckets Expose Genetic and Health Data</title><link>https://breachnotes.vulnetix.com/cloud/2016-07_vitagene-s3-unprotected-buckets/</link><pubDate>Fri, 01 Jan 2016 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2016-07_vitagene-s3-unprotected-buckets/</guid><description>Vitagene, a consumer DNA and ancestry testing company, left Amazon S3 buckets containing raw genetic data files, health reports, and personal information for customers publicly accessible without authentication. The buckets were discovered by researchers in 2019, but had been publicly accessible …</description><content:encoded>Vitagene, a consumer DNA and ancestry testing company, left Amazon S3 buckets containing raw genetic data files, health reports, and personal information for customers publicly accessible without authentication. The buckets were discovered by researchers in 2019, but had been publicly accessible since at least 2016, meaning data may have been accessible for up to three years. Exposed data included raw DNA files, health and ancestry reports, and personal information including names, dates of birth, and health conditions. Vitagene had also disabled CloudTrail logging, making it impossible to determine whether any unauthorized access had occurred. The FTC investigated the company for failing to honor its privacy promises and secure sensitive genetic health data. This case is notable for the extreme sensitivity of the exposed data (raw genetic files) and the lack of audit logging that prevented any assessment of exposure duration.</content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2019/08/01/vitagene-dna-health-data-exposed/</breach:sourceUrl><breach:dateOfBreach>2016-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2019-08-01</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2019-08-15</breach:dateOfCustomerNotification><breach:initialAttackVector>Vitagene left Amazon S3 buckets containing customer raw DNA data and health profile files publicly accessible without authentication, with no CloudTrail logging enabled to detect unauthorized access</breach:initialAttackVector><breach:vendorProduct>Amazon S3</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>LastPass 2015 Data Breach — Email Addresses, Password Reminders, Authentication Hashes</title><link>https://breachnotes.vulnetix.com/cloud/2015-06_lastpass-first-breach/</link><pubDate>Fri, 12 Jun 2015 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2015-06_lastpass-first-breach/</guid><description>On 12 June 2015, LastPass — one of the world's most widely used password managers with tens of millions of users — discovered that its network had been compromised and that user data had been accessed. LastPass disclosed the breach on 15 June 2015 in a blog post. Compromised data included email …</description><content:encoded>On 12 June 2015, LastPass — one of the world&amp;rsquo;s most widely used password managers with tens of millions of users — discovered that its network had been compromised and that user data had been accessed. LastPass disclosed the breach on 15 June 2015 in a blog post. Compromised data included email addresses, password reminder hints, per-user server salts, and authentication hashes. Encrypted user vaults were not compromised because they are only stored client-side. LastPass immediately required all users to verify their email addresses before accessing their accounts and prompted users to change their master passwords (particularly for those with weak passwords). LastPass stated that user passwords remained safely encrypted, and that its encryption/hashing measures were sufficient that the vast majority of users should not be at risk if they had strong master passwords. This 2015 breach was followed by more severe subsequent incidents: the August 2022 breach (developer laptop and source code theft) and the December 2022 breach (vault backups and decryption keys stolen through a compromised DevOps engineer&amp;rsquo;s personal computer). The 2015 incident was the first major public breach of a major password manager and significantly damaged user confidence in password management products generally, highlighting the extreme sensitivity of data held by password managers.</content:encoded><category>cloud</category><breach:sourceUrl>https://blog.lastpass.com/2015/06/lastpass-security-notice/</breach:sourceUrl><breach:dateOfBreach>2015-06-12</breach:dateOfBreach><breach:dateOfDisclosure>2015-06-15</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2015-06-15</breach:dateOfCustomerNotification><breach:initialAttackVector>Unknown attacker compromised LastPass's network and gained access to the LastPass database; specific intrusion vector was not disclosed; the attacker accessed user account email addresses, password reminders, server per-user salts, and authentication hashes</breach:initialAttackVector><breach:vendorProduct>LastPass password manager user database</breach:vendorProduct><breach:cloudProvider>LastPass</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item><item><title>BrowserStack Forgotten AWS Access Key Breach</title><link>https://breachnotes.vulnetix.com/cloud/2014-11_browserstack-aws-access-key-forgotten/</link><pubDate>Sun, 09 Nov 2014 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2014-11_browserstack-aws-access-key-forgotten/</guid><description>In November 2014, BrowserStack, a cloud-based browser and device testing platform, suffered a breach when an attacker discovered a forgotten, active AWS access key that had been created for a prototype project years earlier and never deactivated. The attacker used this key to access an Amazon S3 …</description><content:encoded>In November 2014, BrowserStack, a cloud-based browser and device testing platform, suffered a breach when an attacker discovered a forgotten, active AWS access key that had been created for a prototype project years earlier and never deactivated. The attacker used this key to access an Amazon S3 bucket containing customer records and sent a mass email to all BrowserStack customers claiming the company was selling data and was &amp;lsquo;done.&amp;rsquo; BrowserStack disclosed the breach the same day, rotating all credentials and investigating. The incident exposed customer names and email addresses. BrowserStack&amp;rsquo;s transparent post-mortem blog post became a frequently-cited example of responsible breach disclosure and the security risks of forgotten credentials — credentials that persist long after the need for them has passed.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.browserstack.com/blog/a-scary-incident-and-what-we-did-after/</breach:sourceUrl><breach:dateOfBreach>2014-11-09</breach:dateOfBreach><breach:dateOfDisclosure>2014-11-11</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2014-11-11</breach:dateOfCustomerNotification><breach:initialAttackVector>An old, forgotten AWS access key from a former employee's prototype environment was discovered by an attacker and used to access BrowserStack's production customer database in Amazon S3</breach:initialAttackVector><breach:vendorProduct>Amazon S3; Amazon Web Services</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:iam::{account}:access-key</breach:cloudResourceCrit></item><item><title>Code Spaces AWS Multi-Account Ransomware Destruction (Company Shutdown)</title><link>https://breachnotes.vulnetix.com/cloud/2014-06_codespaces-aws-ransomware/</link><pubDate>Tue, 17 Jun 2014 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2014-06_codespaces-aws-ransomware/</guid><description>Code Spaces was a code hosting and project management platform (similar to GitHub) that operated entirely on AWS. On June 17, 2014, an attacker gained access to Code Spaces' AWS control panel (the EC2 administrative console) via stolen credentials and simultaneously launched a DDoS attack against …</description><content:encoded><![CDATA[Code Spaces was a code hosting and project management platform (similar to GitHub) that operated entirely on AWS. On June 17, 2014, an attacker gained access to Code Spaces&rsquo; AWS control panel (the EC2 administrative console) via stolen credentials and simultaneously launched a DDoS attack against the platform. The attacker sent a demand for payment. When Code Spaces attempted to wrest back control of the AWS console by changing passwords, the attacker retaliated by systematically deleting almost all of Code Spaces&rsquo; EC2 instances, EBS snapshots, S3 objects, and AMIs — both production data and backups. Code Spaces announced on June 18 that the company would be shutting down, as it would be &lsquo;impossible to continue trading.&rsquo; This catastrophic incident is a landmark case in cloud security, illustrating: (1) the existential danger of inadequate AWS account access controls (single-factor authentication on the root/admin account), (2) the importance of keeping backup credentials in isolated accounts, and (3) the need to separate backup storage from the main account so ransomware/attackers cannot destroy backups.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.infoq.com/news/2014/06/code-spaces-shuts-down/</breach:sourceUrl><breach:dateOfBreach>2014-06-17</breach:dateOfBreach><breach:dateOfDisclosure>2014-06-18</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2014-06-18</breach:dateOfCustomerNotification><breach:initialAttackVector>Attacker gained access to Code Spaces' AWS management console (EC2 control panel) using stolen credentials, then launched a DDoS attack and demanded payment; when Code Spaces attempted to regain control, the attacker systematically deleted all EC2 instances, S3 buckets, EBS snapshots, and machine images</breach:initialAttackVector><breach:vendorProduct>Amazon Web Services (EC2, S3, EBS)</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Uber Canada GitHub Credentials — 2014 AWS S3 Breach of 50,000 Driver Records</title><link>https://breachnotes.vulnetix.com/cloud/2014-05_uber-github-aws-50k-drivers/</link><pubDate>Mon, 12 May 2014 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2014-05_uber-github-aws-50k-drivers/</guid><description>In May 2014, a third party accessed an Uber software engineer's private GitHub repository that contained AWS credentials stored in code. Using these credentials, the attacker accessed an Amazon S3 bucket containing a database backup with names and driver's licence numbers for approximately 50,000 …</description><content:encoded>In May 2014, a third party accessed an Uber software engineer&amp;rsquo;s private GitHub repository that contained AWS credentials stored in code. Using these credentials, the attacker accessed an Amazon S3 bucket containing a database backup with names and driver&amp;rsquo;s licence numbers for approximately 50,000 Uber drivers — primarily in the US and Canada. Uber discovered the breach in September 2014 and notified the state attorneys general and affected drivers in February 2015 — approximately nine months after the breach and five months after discovery. Uber sent notification letters to approximately 50,000 current and former Uber drivers. The New York State Attorney General and California Attorney General both opened investigations into Uber&amp;rsquo;s delayed notification. The California AG reached a $25,000 settlement with Uber for the breach notification delay. This 2014 Uber breach is separate from the more famous 2016 Uber breach (where 57 million users and drivers were affected and Uber paid a ransom and concealed the breach for over a year). The 2014 incident established an early pattern of inadequate security practices at Uber, particularly around credential management in developer environments — a practice subsequently recognised as the same attack vector used in countless other breaches.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.uber.com/en-CA/newsroom/update-on-data-security/</breach:sourceUrl><breach:dateOfBreach>2014-05-12</breach:dateOfBreach><breach:dateOfDisclosure>2015-02-27</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2015-02-27</breach:dateOfCustomerNotification><breach:initialAttackVector>An Uber software engineer stored AWS credentials in a private GitHub repository; the repository was accessed by a third party who used the credentials to access an Amazon S3 bucket containing the driver database backup; the third party used the AWS access to download approximately 50,000 driver names and licence numbers</breach:initialAttackVector><breach:vendorProduct>Uber private GitHub / AWS S3 driver database</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Toyota Connected GPS Data Exposure — 2.15 Million Vehicles, 10-Year Undetected Cloud Misconfiguration</title><link>https://breachnotes.vulnetix.com/cloud/2013-11_toyota-connected-gps-10year-exposure/</link><pubDate>Wed, 06 Nov 2013 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2013-11_toyota-connected-gps-10year-exposure/</guid><description>Toyota disclosed in May 2023 that vehicle data for 2.15 million Toyota and Lexus customers in Japan had been publicly accessible via a misconfigured cloud environment for approximately 10 years (November 2013 to April 2023). The exposed data included vehicle GPS data (location and timing …</description><content:encoded>Toyota disclosed in May 2023 that vehicle data for 2.15 million Toyota and Lexus customers in Japan had been publicly accessible via a misconfigured cloud environment for approximately 10 years (November 2013 to April 2023). The exposed data included vehicle GPS data (location and timing information), vehicle identification numbers, and in-vehicle device IDs. The data was collected through Toyota&amp;rsquo;s T-Connect telematics service (which provides connected car features including navigation and emergency assistance). The exposure was discovered during a security audit Toyota initiated following an earlier disclosure (in October 2022, Toyota revealed that 296,019 customers&amp;rsquo; email addresses and customer management numbers had been exposed since December 2017 through a source code error by a development contractor who had committed access credentials to a public GitHub repository — undetected for nearly five years). The 2023 cloud misconfiguration disclosure — covering 2.15 million vehicles — prompted Toyota to conduct a comprehensive review of all cloud environments, which subsequently revealed additional exposures: in July 2023 Toyota disclosed further cloud misconfigurations potentially affecting up to 9.5 million customers globally across Toyota operations in multiple countries. Toyota apologized and implemented automated security monitoring for cloud configurations. The case became a prominent example of long-running cloud security misconfigurations at major automotive manufacturers.</content:encoded><category>cloud</category><breach:sourceUrl>https://global.toyota/en/newsroom/corporate/38457914.html</breach:sourceUrl><breach:dateOfBreach>2013-11-06</breach:dateOfBreach><breach:dateOfDisclosure>2023-05-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-05-12</breach:dateOfCustomerNotification><breach:initialAttackVector>Misconfigured Toyota Connected cloud environment exposed vehicle location data to the public internet; the data was stored in a cloud environment (managed by Toyota's subsidiary Toyota Connected) with misconfigured access controls that made it publicly accessible without authentication for approximately 10 years</breach:initialAttackVector><breach:vendorProduct>Toyota Connected cloud platform / Toyota T-Connect telematics service</breach:vendorProduct><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Toyota Connected Vehicle Cloud Misconfiguration (2.15M Customers, 10-Year Exposure)</title><link>https://breachnotes.vulnetix.com/cloud/2023-05_toyota-connected-cloud-misconfiguration-2m/</link><pubDate>Wed, 06 Nov 2013 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2023-05_toyota-connected-cloud-misconfiguration-2m/</guid><description>Toyota Motor Corporation disclosed on May 12, 2023 that vehicle location data and other connected vehicle information for approximately 2.15 million customers in Japan had been publicly accessible for nearly a decade — from November 6, 2013 to April 17, 2023 (approximately 9.5 years). Affected …</description><content:encoded>Toyota Motor Corporation disclosed on May 12, 2023 that vehicle location data and other connected vehicle information for approximately 2.15 million customers in Japan had been publicly accessible for nearly a decade — from November 6, 2013 to April 17, 2023 (approximately 9.5 years). Affected customers were subscribers to Toyota&amp;rsquo;s connected vehicle services: T-Connect, G-Link, G-Link Lite, and G-BOOK. The misconfiguration was discovered through a new data governance audit program Toyota implemented to proactively review its cloud infrastructure. Exposed data included vehicle GPS location data, in-vehicle terminal identification numbers, vehicle identification numbers (VINs), and timestamps. Dashboard camera footage captured from outside the vehicle was also accessible for a subset of T-Connect members during the period November 14, 2016 to April 4, 2023. Toyota found no evidence of malicious access or data misuse. A follow-up disclosure on May 31, 2023 covered an additional ~260,000 vehicle owners outside Japan whose data was also exposed. Toyota subsequently implemented automated tools to continuously monitor cloud configurations. This incident is entirely separate from the August 2024 Toyota dark web leak (240GB of internal data) documented separately in this repository. The 10-year exposure window made it one of the longest-running cloud misconfiguration incidents on record.</content:encoded><category>cloud</category><breach:sourceUrl>https://www.bleepingcomputer.com/news/security/toyota-car-location-data-of-2-million-customers-exposed-for-ten-years/</breach:sourceUrl><breach:dateOfBreach>2013-11-06</breach:dateOfBreach><breach:dateOfDisclosure>2023-05-12</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2023-05-12</breach:dateOfCustomerNotification><breach:initialAttackVector>Cloud misconfiguration — Toyota's connected vehicle cloud environment was configured to be publicly accessible without authentication; the misconfiguration resulted from 'insufficient explanation and thoroughness of data handling rules' causing data not to be stored with appropriate access controls</breach:initialAttackVector><breach:vendorProduct>Toyota Connected cloud environment (T-Connect, G-Link, G-Link Lite, G-BOOK)</breach:vendorProduct><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility></item><item><title>Prestige Software Hotel Reservation Platform AWS S3 Exposure (November 2020)</title><link>https://breachnotes.vulnetix.com/cloud/2020-11_hotels-customers-of-prestige-softwar-prestige-software/</link><pubDate>Tue, 01 Jan 2013 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2020-11_hotels-customers-of-prestige-softwar-prestige-software/</guid><description>Prestige Software, a Spain-based hotel channel management platform used by major
online travel agencies including Hotels.com, Booking.com, and Expedia, left a
misconfigured Amazon Web Services S3 bucket publicly accessible without any
authentication. The exposure was discovered and disclosed by …</description><content:encoded><![CDATA[<p>Prestige Software, a Spain-based hotel channel management platform used by major
online travel agencies including Hotels.com, Booking.com, and Expedia, left a
misconfigured Amazon Web Services S3 bucket publicly accessible without any
authentication. The exposure was discovered and disclosed by Website Planet researchers
on November 6, 2020. The S3 bucket contained 24.4 GB of data comprising over 10
million files, with records dating back to 2013 — approximately seven years of
hotel reservation data.</p>
<p>The exposed records contained highly sensitive guest and payment information: full
names, phone numbers, email addresses, national ID numbers, full credit card numbers
(including cardholder names, CVV codes, and expiration dates), reservation numbers,
check-in and check-out dates, nightly room rates, number of guests, and special
requests. The S3 bucket was still live and actively receiving new records at the
time of discovery, with over 180,000 records uploaded in August 2020 alone.</p>
<p>The breach violated PCI DSS (Payment Card Industry Data Security Standard) requirements,
which prohibit storing unencrypted CVV codes and mandate strict controls over full
card numbers. The presence of full card data including CVVs means the exposed records
could be used directly for card-not-present fraud without further processing.</p>
<p>Website Planet contacted AWS directly to expedite resolution; the bucket was secured
the following day. Prestige Software serves as a channel manager — a middleware
platform that synchronizes hotel inventory and reservations across multiple OTA
(Online Travel Agency) channels. This architectural role means a single misconfiguration
at Prestige cascaded exposure across guests of numerous hotel brands and OTA partners
who had no visibility into the vendor&rsquo;s storage practices.</p>
<p>The incident is classified as an inadvertent data exposure rather than an active
intrusion. No CVEs apply — the root cause was a failure to apply access controls
to an S3 bucket. The breach affected an estimated millions of hotel guests worldwide
across multiple hotel brands and booking platforms, though exact victim counts were
not publicly disclosed by Prestige Software.</p>
]]></content:encoded><category>cloud</category><breach:sourceUrl>https://www.websiteplanet.com/blog/prestige-soft-breach-report/</breach:sourceUrl><breach:dateOfBreach>2013-01-01</breach:dateOfBreach><breach:dateOfDisclosure>2020-11-06</breach:dateOfDisclosure><breach:initialAttackVector>Misconfigured AWS S3 bucket left publicly accessible without authentication; contained hotel reservation records dating back to 2013</breach:initialAttackVector><breach:vendorProduct>Prestige Software</breach:vendorProduct><breach:cloudProvider>AWS</breach:cloudProvider><breach:cloudSharedResponsibility>customer</breach:cloudSharedResponsibility><breach:cloudResourceCrit>arn:aws:s3:::{bucket}</breach:cloudResourceCrit></item><item><title>Dropbox Credential Reuse Breach via LinkedIn (68M Accounts)</title><link>https://breachnotes.vulnetix.com/cloud/2016-08_dropbox-credential-reuse-68m/</link><pubDate>Sun, 01 Jul 2012 00:00:00 +0000</pubDate><guid isPermaLink="true">https://breachnotes.vulnetix.com/cloud/2016-08_dropbox-credential-reuse-68m/</guid><description>The Dropbox breach of approximately July 2012 originated from employee password reuse. A Dropbox employee had reused their LinkedIn account password for their corporate Dropbox work account. When the LinkedIn breach (also 2012) exposed that employee's hashed LinkedIn password and it was cracked, …</description><content:encoded><![CDATA[The Dropbox breach of approximately July 2012 originated from employee password reuse. A Dropbox employee had reused their LinkedIn account password for their corporate Dropbox work account. When the LinkedIn breach (also 2012) exposed that employee&rsquo;s hashed LinkedIn password and it was cracked, attackers used it to log into the employee&rsquo;s Dropbox account. Inside, they found a Dropbox document containing a database backup with hashed email addresses and passwords for approximately 68 million Dropbox users. Dropbox did not discover or disclose the breach until August 2016 — four years later — when the data appeared on dark web trading sites. Dropbox force-reset all user passwords from before mid-2012 as a precaution. The breach is a canonical case study on the dangers of password reuse, the importance of MFA, and the risks of storing sensitive data in an employee&rsquo;s cloud storage account. It also demonstrated the downstream &lsquo;credential chain&rsquo; effect: the LinkedIn breach created the conditions for the Dropbox breach.]]></content:encoded><category>cloud</category><breach:sourceUrl>https://techcrunch.com/2016/08/30/dropbox-employees-password-reuse-led-to-theft-of-60m-user-credentials/</breach:sourceUrl><breach:dateOfBreach>2012-07-01</breach:dateOfBreach><breach:dateOfDisclosure>2016-08-30</breach:dateOfDisclosure><breach:dateOfCustomerNotification>2016-08-30</breach:dateOfCustomerNotification><breach:initialAttackVector>A Dropbox employee reused their LinkedIn password for their Dropbox work account; when the 2012 LinkedIn breach exposed that password, attackers used it to log into the employee's Dropbox work account, which contained a document with hashed Dropbox user passwords</breach:initialAttackVector><breach:cloudProvider>Dropbox</breach:cloudProvider><breach:cloudSharedResponsibility>vendor</breach:cloudSharedResponsibility></item></channel></rss>