Credential theft
Snapchat Employee Payroll Data Theft via CEO Impersonation
Primary Source βIncident Details
On 26 February 2016, a Snapchat payroll department employee received an email purportedly from CEO Evan Spiegel requesting payroll information for employees. The employee complied and emailed payroll data for a number of current and former Snapchat employees to the attacker. Snapchat disclosed the breach on 28 February 2016 and apologised to affected employees. Exposed data included W-2 earnings information and payroll information for approximately 700 current and former employees, including names, Social Security numbers, wages, and addresses. Snapchat notified all affected employees, offered credit monitoring and identity theft insurance, and contacted the FBI. Snapchat called it a ‘phishing scam’ and confirmed no user data was affected. The CEO impersonation method β known as ‘spear-phishing executive impersonation’ or ‘CEO fraud’ β is a variant of business email compromise where attackers research executive names from public sources (LinkedIn, company websites) and send convincing emails impersonating them to employees with financial or HR access. The FBI’s Internet Crime Complaint Center (IC3) had issued warnings about this exact type of attack in January 2015 and February 2016, noting it had cost US businesses approximately $1 billion. Snapchat’s breach came weeks after similar CEO fraud incidents at Austria’s FACC (β¬50M loss) and Belgium’s Crelan bank (β¬70M loss).
Technical Details
- Initial Attack Vector
- An attacker impersonated Snapchat's CEO Evan Spiegel in a phishing email sent to a Snapchat payroll employee, requesting payroll information; the employee complied and sent payroll data for a number of current and former employees to the attacker β a classic CEO fraud / business email compromise (BEC) attack
- Vendor / Product
- Snapchat HR / payroll systems
Timeline
- 2016-02-26 Breach occurred
- 2016-02-28 Publicly disclosed
- 2016-02-28 Customers notified