Venkat Raghavan’s Post

View profile for Venkat Raghavan, graphic

CEO, Founder, Operating Partner

Great read. Mandiant analysis on UNC5537 Threat campaign that targets Snowflake Customer Instances for Data Theft and Extortion https://lnkd.in/e-BWZAbQ The report goes into a lot of details but here are the 3 primary factors. 1) The impacted accounts were not configured with multi-factor authentication enabled, meaning successful authentication only required a valid username and password. 2) Credentials identified in infostealer malware output were still valid, in some cases years after they were stolen, and had not been rotated or updated. 3) The impacted Snowflake customer instances did not have network allow lists in place to only allow access from trusted locations. 1, 2 and 3 are standard "rinse and repeat" pattern for data exfiltration. Stolen credentials, lack of MFA and unauthorized access that enable lateral movement. What is interesting is the Recon phase. In the recon phase all of the recon activities used SQL including listing users, current roles, current IPs, session IDs, and organization names etc. Mandiant observed UNC5537 repeatedly executing similar SQL commands across numerous customer Snowflake instances to stage and exfiltrate data. The following commands were observed for data staging and exfiltration. How are many of the ITDR solutions out there have any clue of SQL commands and would have called out these recon activities as anomalous or Ransomware enumerations? I bet close to zero. While UNC5537 targeted Snowflake, this broader pattern is the result of the proliferation of IDPs (Multi IDP environments) in which identity posture, threat detection and lateral movement pathways gets fragmented and complicated. A single user ends up having multiple accounts. The challenge is how do you stitch together a unified posture and threat context as every IDP is blind to all identity activities that it does not see or control. Closed platforms won't cut it. Identity populations are fragmented - Multi IDP, Multi Cloud, Data platforms and SaaS. This makes the case for open Identity Data Lake architecture that unifies identity data across identity populations with analytics and actions to support targeted use cases - ISPM, ITDR, Least privileged posture, JIT etc. #ISPM #ITDR #LeastPrivileged #JIT #DSPM

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion | Google Cloud Blog

UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion | Google Cloud Blog

cloud.google.com

Prabhat Pathak

Director of IT - Cyber Security and Technology | CISM,CEH,CISA,GDPR,TOGAF | IIM-A

4w

Thanks for Sharing

Yashwanth Hemaraj

General Partner @ BGV, Arka | Products, Startups, Strategy

4w

Thanks for sharing the analysis Venkat Raghavan

Bharat Raigangar

Board Advisor, 1CxO, vCISO CyberSecurist & Mentor - Digital Transformation CyberResilience - CyberInsurance-SupplyChain Threat Mang

4w

Useful tips and insight from the expert especially around recon… thanks Venkat Raghavan

See more comments

To view or add a comment, sign in

Explore topics