On May 31, 2024, Hudson Rock reported that customer data from Snowflake, a cloud-based data warehouse platform, had been compromised through the theft of employee credentials via an infostealer to obtain access to customer accounts and data. Separate reporting from Mitiga, an independent security consulting firm, stated that a threat actor referred to as UNC5537 had used stolen customer credentials and gained unauthorized access to Snowflake databases, with the primary focus of data theft and extortion.
We are sharing details of this ongoing campaign to provide situational awareness and help organizations defend against this threat. As this is a developing situation, we may add further information via additional Security Bulletins as more threat intelligence becomes available.
Infostealer campaign details
According to available reporting by Hudson Rock, a Snowflake employee's credentials were compromised through an infostealer infection in October 2023. Allegedly, this allowed the threat actor to bypass Okta and generate Snowflake session tokens, enabling them to exfiltrate significant amounts of data from Snowflake's servers. The threat actor claimed to have access to data from 400 companies that stored their data with Snowflake.
Hudson Rock reported that they corresponded with an alleged threat actor who claimed that they were able to exfiltrate data from TicketMaster and Santander via the compromised employee credentials they gained access to.
Response from Snowflake
According to Snowflake, increased threat activity was observed around mid-April 2024 from a subset of IP addresses originating from providers of commercial VPN services.
Based on their investigation as of May 31, 2024 at 2:16 PM ET, Snowflake statedthat they did not believe that they were the source of any compromised credentials in this campaign, and that they didn’t have specific evidence of misconfiguration or vulnerabilities in their product leading to the compromise. Snowflake has contacted the customers thought to be impacted.
Arctic Wolf is a customer of its own products/services and if applicable, we will follow the same recommendations outlined for our customers in this Security Bulletin.