• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cloudflare breach: nation state hackers access source code and internal docs

Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs

You are here: Home / General Cyber Security News / Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs
February 2, 2024

Cloudflare has uncovered that it was the goal of a probable nation-state attack in which the risk actor leveraged stolen qualifications to attain unauthorized access to its Atlassian server and eventually accessibility some documentation and a confined sum of resource code.

The intrusion, which took location amongst November 14 and 24, 2023, and detected on November 23, was carried out “with the intention of acquiring persistent and prevalent obtain to Cloudflare’s world-wide network,” the web infrastructure corporation mentioned, describing the actor as “complex” and one who “operated in a considerate and methodical way.”

As a precautionary measure, the organization further mentioned it rotated additional than 5,000 manufacturing qualifications, bodily segmented exam and staging methods, carried out forensic triages on 4,893 techniques, reimaged and rebooted every single device across its international network.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The incident included a four-day reconnaissance interval to accessibility Atlassian Confluence and Jira portals, adhering to which the adversary designed a rogue Atlassian user account and founded persistent accessibility to its Atlassian server to in the long run acquire obtain to its Bitbucket supply code management technique by implies of the Sliver adversary simulation framework.

Cybersecurity

As a lot of as 120 code repositories were viewed, out of which 76 are estimated to have been exfiltrated by the attacker.

“The 76 resource code repositories were virtually all associated to how backups get the job done, how the world network is configured and managed, how id is effective at Cloudflare, distant obtain, and our use of Terraform and Kubernetes,” Cloudflare explained.

“A smaller variety of the repositories contained encrypted secrets and techniques which have been rotated quickly even although they have been strongly encrypted by themselves.”

The danger actor is then reported to have unsuccessfully attempted to “obtain a console server that experienced obtain to the info heart that Cloudflare experienced not nonetheless set into manufacturing in São Paulo, Brazil.”

The attack was achieved by building use of just one access token and three provider account qualifications associated with Amazon Web Solutions (AWS), Atlassian Bitbucket, Moveworks, and Smartsheet that have been stolen adhering to the Oct 2023 hack of Okta’s guidance circumstance management method.

Cybersecurity

Cloudflare acknowledged that it experienced unsuccessful to rotate these qualifications, mistakenly assuming they were unused.

The corporation also said it took techniques to terminate all destructive connections originating from the danger actor on November 24, 2024. It also associated cybersecurity business CrowdStrike to complete an impartial assessment of the incident.

“The only output units the threat actor could access using the stolen qualifications was our Atlassian atmosphere. Examining the wiki pages they accessed, bug database issues, and source code repositories, it seems they have been wanting for details about the architecture, security, and administration of our world network,” Cloudflare said.

Observed this post intriguing? Follow us on Twitter  and LinkedIn to read through far more exceptional written content we article.


Some components of this post are sourced from:
thehackernews.com

Previous Post: «fritzfrog returns with log4shell and pwnkit, spreading malware inside your FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network
Next Post: INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs interpol arrests 31 in global operation, identifies 1,900+ ransomware linked ips»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.