July 15, 2024 Breach

Not a Platform Breach — Something Worse

In the spring of 2024, a threat actor tracked by Mandiant as UNC5537 systematically targeted Snowflake customer accounts using stolen credentials, compromising data belonging to at least 165 organizations. Critically, this was not a breach of Snowflake's platform infrastructure. Snowflake's own systems were not compromised. Instead, the attackers exploited a far more common and preventable weakness: customer accounts that were not protected by multi-factor authentication (MFA).

The incident became one of the most significant cloud security events of 2024, with victims including some of the world's largest companies and hundreds of millions of individual records exposed. For third-party risk management professionals, it raised fundamental questions about the shared responsibility model in cloud computing and who bears accountability when a vendor's customers fail to implement basic security controls.

How UNC5537 Operated

According to Mandiant's investigation, published in collaboration with Snowflake, UNC5537 obtained credentials from multiple sources, including historical infostealer malware infections that had compromised the devices of Snowflake customers and contractors. The stolen credentials, some dating back to 2020, were still valid because the affected accounts had not rotated their passwords or enabled MFA.

The attackers used these credentials to log in to Snowflake customer accounts, enumerate available databases, and exfiltrate large volumes of data. In many cases, the attackers used a utility called rapeflake (later renamed DBeaver Ultimate in their tooling) to automate data extraction. The stolen data was then used for extortion, with UNC5537 demanding ransoms from victims and threatening to publish or sell the data on criminal forums.

The Victims: Massive Data Exposures

The scale of data exposed through the Snowflake-related breaches was staggering:

Organization Records Exposed Data Type
Ticketmaster (Live Nation) 560 million Customer names, emails, phone numbers, payment data
AT&T 110 million Call and text metadata for nearly all wireless customers
Santander Bank 30 million Customer and employee account data
Advance Auto Parts 79 million Employee and customer personal information
Neiman Marcus 31 million Customer data including email addresses
LendingTree / QuoteWizard Undisclosed Customer data under investigation

AT&T's disclosure was particularly notable: the company confirmed that call and text metadata for nearly all of its wireless customers over a six-month period had been stolen from its Snowflake environment. AT&T reportedly paid a $370,000 ransom to have the data deleted.

The Shared Responsibility Problem

Snowflake's response emphasized that its own platform had not been breached and that the compromises resulted from customers failing to enable MFA. Snowflake was technically correct — the shared responsibility model places authentication controls in the customer's domain. However, the incident exposed a critical gap: Snowflake did not require MFA by default and had not enforced it even for accounts with access to massive datasets.

In response to the incident, Snowflake announced that it would require all customers to implement MFA, a policy change that many security professionals argued should have been in place long before the breaches occurred.

TPRM Lesson Learned: The Snowflake incident redefines how TPRM programs should evaluate cloud vendors. It is not enough to assess whether a cloud vendor's platform is secure; organizations must also assess whether the vendor enforces security controls on customer accounts. TPRM questionnaires for cloud data platforms should include: "Does the vendor require MFA for all user accounts?" "Does the vendor enforce password rotation policies?" "Can the vendor detect and alert on credential stuffing attacks?" A vendor that allows customers to operate without MFA on accounts containing sensitive data introduces systemic risk, even if the vendor's own infrastructure is hardened.

TPRM Implications

FAIR Analysis of Cloud Credential Risk

Applying the FAIR framework to the Snowflake scenario, the threat event frequency is high: credential stuffing attacks are continuous and automated. The vulnerability (lack of MFA) is binary — accounts either have it or do not. The loss magnitude, as demonstrated by the Ticketmaster and AT&T exposures, is extreme. FAIR quantification helps organizations understand that the expected loss from operating cloud data platforms without MFA vastly exceeds the cost of implementing and enforcing MFA across all vendor accounts.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion - Mandiant (Google Cloud)
  2. Snowflake Security Advisory: Credential Stuffing Investigation - Snowflake Community
  3. Snowflake Breach: Lessons Learned for Cloud Security - Cloud Security Alliance
  4. AT&T SEC 8-K Filing on Data Breach - U.S. Securities and Exchange Commission
  5. The Snowflake Attack May Be Turning Into One of the Largest Data Breaches Ever - Wired