Wednesday, January 21, 2026
HomeTechnologyThree methods to quell Snowflake assaults

Three methods to quell Snowflake assaults


More than a month has handed because the spate of information thefts from Snowflake environments, and the total scope of the incident is changing into clearer, with at the very least 165 victims, over 500 stolen credentials, and suspicious exercise linked to identified malware from almost 300 IP addresses.

In June, the cloud knowledge providers supplier backed away from the incident, pointing to a cybersecurity investigation report revealed by incident response suppliers Google Mandiant and CrowdStrike, which famous that 165 Snowflake prospects could have been affected by credentials stolen by information-stealing malware. In a June 2 replace, Snowflake confirmed that it had discovered no proof that vulnerabilities, misconfigurations, breaches, or stolen worker credentials led to the information leak.

“[E]”All incidents responded to by Mandiant associated to this marketing campaign have been traced again to compromised buyer credentials,” Google Mandiant mentioned.

Snowflake urged prospects to make sure multi-factor authentication (MFA) is in place on all accounts, to create community coverage guidelines to restrict IP addresses to identified and trusted places, and to reset their Snowflake credentials.

But specialists say these measures alone aren’t sufficient: corporations must know the way their SaaS sources are getting used, and might’t depend on customers selecting safety over comfort.

“When you construct a system that assumes people won’t ever fail, it is a actually dangerous system,” says Glenn Chisholm, co-founder and chief product officer at SaaS safety supplier Obsidian Security. “Good engineers design programs that assume people will fail.”

Here are some further defenses that safety groups ought to think about to detect safety failures in Snowflake and different SaaS cloud providers.

1. Collect account knowledge and analyze it usually

Security groups should first perceive their SaaS atmosphere and monitor adjustments in that atmosphere. In the case of Snowflake, the Snowsight net consumer can be utilized to assemble knowledge about consumer accounts and different entities (reminiscent of functions and roles) and the permissions granted to these entities.

The panorama can turn out to be difficult rapidly. For instance, Snowflake has 5 totally different administrative roles that prospects can provision, based on SpecterOps, which analyzed Snowflake’s potential assault vectors.

Snowflake Access Graph

And as a result of corporations are inclined to over-provision roles, attackers can acquire capabilities by non-admin roles, mentioned Jared Atkinson, chief strategist at SpecterOps.

“Administrators are inclined to grant entry to sources extra simply or give customers a bit of extra entry than they want — suppose admin entry as an alternative of write entry,” he says. “This won’t be an enormous concern for one consumer and one useful resource, however over time as your small business scales, it may possibly turn out to be an enormous burden.”

By querying customers who’ve a password set, fairly than having the password worth set to False and thus stopping password-based authentication, and reviewing the login historical past the place the authentication issue was used, it might be potential to detect suspicious or dangerous consumer accounts.

2. Provision consumer accounts by your id supplier

Because fashionable enterprise infrastructure is more and more primarily based within the cloud, corporations should, at a minimal, combine a single sign-on supplier for all workers to handle id and entry to cloud suppliers. Without that degree of management — having the ability to rapidly provision and deprovision workers — the normal assault floor will proceed to plague corporations, says Obsidian’s Chisholm.

Additionally, corporations want to make sure that SSO is correctly configured to permit safe connections by robust authentication mechanisms, and simply as importantly, older strategies must be disabled and any functions that enable third-party entry ought to at the very least be monitored, he says.

“An attacker may add a username and password to the credentials, add credentials by a service account, after which be capable of log into that service account, and no one was monitoring that,” Chisholm mentioned. “Nobody was monitoring the third-party entry accounts, the third-party connections… But all of those interconnections, plus the entire connections that builders make, add as much as an unimaginable floor space that may be breached.”

Snowflake helps System for Cross-domain Identity Management (SCIM), permitting SSO providers and software program (particularly, the corporate calls Okta SCIM and Azure AD SCIM) to handle Snowflake accounts and roles.

3. Find a approach to restrict the explosion radius when invading

The knowledge leak attributable to Snowflake’s advanced safety configuration could ultimately rival or surpass previous breaches. At least one report has discovered as many as 500 reputable credentials for Snowflake providers on-line. Restricting or stopping entry from unknown Internet addresses, for instance, can restrict the affect of stolen credentials and session keys. In its most up-to-date replace on June 11, Snowflake listed 296 suspicious IP addresses related to information-stealing malware.

SpecterOps’ Atkinson says it is essential to search out different methods to restrict assault vectors to delicate knowledge.

“We know from expertise and the main points of this incident that there’s restricted capability to scale back the assault floor, as credentials have been probably stolen from a contractor’s system and entry to that system may circumvent all of Snowflake’s suggestions,” he mentioned. “Some attackers will nonetheless get by. Attack path controls considerably restrict an attacker’s capability to entry and affect sources.”

According to Snowflake documentation, community insurance policies help you block unknown web addresses whereas permitting identified IPs to connect with your Snowflake account.



Source hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Popular