Close Menu
Technology Mag

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    7 Ways to Limit Your Endless Doomscrolling

    June 19, 2025

    Google tests real-time AI voice chats in Search

    June 18, 2025

    How The Roottrees are Dead ditched AI and became a hit

    June 18, 2025
    Facebook X (Twitter) Instagram
    Subscribe
    Technology Mag
    Facebook X (Twitter) Instagram YouTube
    • Home
    • News
    • Business
    • Games
    • Gear
    • Reviews
    • Science
    • Security
    • Trending
    • Press Release
    Technology Mag
    Home » Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake
    Security

    Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake

    News RoomBy News RoomJune 20, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email

    It’s possible the ShinyHunter hackers did not directly hack the EPAM worker, and simply gained access to the Snowflake accounts using usernames and passwords they obtained from old repositories of credentials stolen by info stealers. But, as Reddington points out, this means that anyone else can sift through those repositories for these and other credentials stolen from EPAM accounts. Reddington says they found data online that was used by nine different infostealers to harvest data from the machines of EPAM workers. This raises potential concerns about the security of data belonging to other EPAM customers.

    EPAM has customers across various critical industries, including banks and other financial services, health care, broadcast networks, pharmaceutical, energy and other utilities, insurance, and software and hi-tech—the latter customers include Microsoft, Google, Adobe, and Amazon Web Services. It’s not clear, however, if any of these companies have Snowflake accounts to which EPAM workers have access. WIRED also wasn’t able to confirm whether Ticketmaster, Santander, Lending Tree, or Advance AutoParts are EPAM customers.

    The Snowflake campaign also highlights the growing security risks from third-party companies in general and from infostealers. In its blog post this week, Mandiant suggested that multiple contractors were breached to gain access to Snowflake accounts, noting that contractors—often known as business process outsourcing (BPO) companies—are a potential gold mine for hackers, because compromising the machine of a contractor that has access to the accounts of multiple customers can give them direct access to many customer accounts.

    “Contractors that customers engage to assist with their use of Snowflake may utilize personal and/or non-monitored laptops that exacerbate this initial entry vector,” wrote Mandiant in its blog post. “These devices, often used to access the systems of multiple organizations, present a significant risk. If compromised by infostealer malware, a single contractor’s laptop can facilitate threat actor access across multiple organizations, often with IT and administrator-level privileges.”

    The company also highlighted the growing risk from infostealers, noting that the majority of the credentials the hackers used in the Snowflake campaign came from repositories of data previously stolen by various infostealer campaigns, some of which dated as far back as 2020. “Mandiant identified hundreds of customer Snowflake credentials exposed via infostealers since 2020,” the company noted.

    This, accompanied by the fact that the targeted Snowflake accounts didn’t use MFA to further protect them, made the breaches in this campaign possible, Mandiant notes.

    Snowflake’s CISO, Brad Jones, acknowledged last week that the lack of multifactor authentication enabled the breaches. In a phone call this week, Jones told WIRED that Snowflake is working on giving its customers the ability to mandate that users of their accounts employ multifactor authentication going forward, “and then we’ll be looking in the future to [make the] default MFA,” he says.

    Update 6/17/2024, 5:45 pm EDT: The article was updated to clarify the details that Santander has publicly revealed about the hack.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
    Previous ArticleAcer’s Chromebook Plus Spin 714 Is a Premium Laptop at a Reasonable Price
    Next Article Anker’s fastest power bank is matching its lowest price

    Related Posts

    6 Tools for Tracking the Trump Administration’s Attacks on Civil Liberties

    June 17, 2025

    Why We Made a Guide to Winning a Fight

    June 16, 2025

    The High-Flying Escalation of CBP’s Predator Drone Flights Over LA

    June 16, 2025

    RFK Jr. Orders HHS to Give Undocumented Migrants’ Medicaid Data to DHS

    June 16, 2025

    Social Media Is Now a DIY Alert System for ICE Raids

    June 14, 2025

    A Starter Guide to Protecting Your Data From Hackers and Corporations

    June 13, 2025
    Our Picks

    Google tests real-time AI voice chats in Search

    June 18, 2025

    How The Roottrees are Dead ditched AI and became a hit

    June 18, 2025

    NFC is getting a range boost

    June 18, 2025

    Ancestra actually says a lot about the current state of AI-generated videos

    June 18, 2025
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Don't Miss
    Gear

    Finally, an OLED Monitor Under $1,000 That Isn’t Only for Gamers

    By News RoomJune 18, 2025

    Speaking of that bottom bezel, you’ll notice the camera dead center below the screen—normally a…

    YouTube is plugging Veo 3 AI videos directly into Shorts

    June 18, 2025

    Facebook rolls out passkey support to fight phishing attacks

    June 18, 2025

    Govee’s latest smart lamp has party speaker aspirations

    June 18, 2025
    Facebook X (Twitter) Instagram Pinterest
    • Privacy Policy
    • Terms of use
    • Advertise
    • Contact
    © 2025 Technology Mag. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.