| Security Market Segment LS |
|---|
Entertainment giant Live Nation revealed last week it was the victim of a cyber attack that compromised user data. An analyst report - since removed - alleged the breach occurred through the data cloud platform Snowflake, an allegation Snowflake stringently denies.
560 million Ticketmaster customers may have their details released through a cyber breach, with a massive 1.3 terabytes of customer data - including names, addresses, credit card numbers, phone numbers, and payment details.
Hacking group ShinyHunters is claiming responsibility, and what's more, is asking Ticketmaster to pay a ransom of half a million US dollars ($AUD 750,000) or the data will be made public.
While details are still coming in, the leak appears to have occurred through a compromised Snowflake data cloud credential. This led to Israeli research firm Hudson Rock asserting Snowflake itself had been compromised, and that Snowflake customers must be wary. Snowflake adamantly denies it has suffered any breach. Hudson Rock has since removed its report, with no trace now found anywhere on its website - but not before news outlets and other analysts ran with it, incorrectly asserting Snowflake itself had been breached. Current thinking is that a Ticketmaster developer's credentials were exposed through a different product, and, alas, without MFA protection on their Snowflake account.
Snowflake hasstated in no uncertain terms:
Snowflake continues to remind customers of the value of multi-factor authentication (MFA), something that iTWire alsoregularly advocates all readers employ for all their accounts across all their products and services.
No matter which organisations were involved, it's a timely reminder to Snowflake administrators to review their account security.
The Australian Cyber Security Centre (ACSC) issuedan alert on Saturday 1 June 2024 advocating Snowflake customers to ensure they utilise MFA, disable unused accounts, and review user activity.
Mark Jones, a Senior Partner atTesserent, a Thales Australia cybersecurity company also stressed “it’s important for organisations to protect sensitive information, safeguard intellectual property, maintain supply chain integrity, ensure compliance with regulations, and mitigate operational risks. Organisations should not only focus on internal controls, but also put a strong focus on managing their third-party suppliers and understand and assess the security risks they may pose."
It's important to note that while Snowflake offers MFA and has a tight integration with Duo, MFA is not automatically enabled on a Snowflake account, and nor can the administrator force it to be on for any specific user. Instead, users must self-enrol into MFA following theinstructions here. Administrators can disable MFA if a user loses a device, but the responsibility to turn it on in the first place lies with the user. Although this is not an ideal situation - preferably, an administrator could make MFA mandatory for all their users - it's something Snowflake users can - and should - activate immediately.
The investigation into Ticketmaster's breach is ongoing.
Image byGerd Altmann fromPixabay


David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.
Spot on Ms Roy. Along with this goes the trend to short, job ready courses at universities, expounded once by[…]
That MSI dragon laptop looks cool! But $11,799 ....... :O I might think on a bit longer :)
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]