• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
midnight blizzard and cloudflare atlassian cybersecurity incidents: what to know

Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know

You are here: Home / General Cyber Security News / Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know
February 13, 2024

The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in important SaaS platforms. These incidents illustrate the stakes included in SaaS breaches — safeguarding the integrity of SaaS apps and their delicate data is critical but is not simple. Frequent threat vectors this sort of as subtle spear-phishing, misconfigurations and vulnerabilities in third-party app integrations reveal the intricate security troubles struggling with IT units.

In the circumstance of Midnight Blizzard, password spraying towards a examination atmosphere was the first attack vector. For Cloudflare-Atlassian, menace actors initiated the attack via compromised OAuth tokens from a prior breach at Okta, a SaaS identification security service provider.

What Precisely Took place?

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Microsoft Midnight Blizzard Breach

Microsoft was focused by the Russian “Midnight Blizzard” hackers (also acknowledged as Nobelium, APT29, or Cozy Bear) who are joined to the SVR, the Kremlin’s overseas intelligence provider unit.

In the Microsoft breach, the risk actors:

  • Employed a password spray system on a legacy account and historic test accounts that did not have multi-factor authentication (MFA) enabled. In accordance to Microsoft, the risk actors “[used] a low variety of makes an attempt to evade detection and steer clear of account blocks primarily based on the volume of failures.”
  • Leveraged the compromised legacy account as an preliminary entry place to then hijack a legacy examination OAuth app. This legacy OAuth app had significant-amount permissions to accessibility Microsoft’s corporate setting.
  • Created malicious OAuth apps by exploiting the legacy OAuth app’s permissions. Because the risk actors managed the legacy OAuth application, they could maintain entry to the programs even if they lost access to the originally compromised account.
  • Granted admin Exchange permissions and admin qualifications to on their own.
  • Escalated privileges from OAuth to a new user, which they controlled.
  • Consented to the destructive OAuth programs employing their newly created consumer account.
  • Escalated the legacy application’s obtain even further by granting it comprehensive accessibility to M365 Exchange On line mailboxes. With this access, Midnight Blizzard could look at M365 email accounts belonging to senior employees customers and exfiltrate company emails and attachments.
  • Cloudflare-Atlassian Cybersecurity IncidentsRecreation of illustration by Amitai Cohen

    Cloudflare-Atlassian Breach

    On Thanksgiving Day, November 23, 2023, Cloudflare’s Atlassian programs ended up also compromised by a country-point out attack.

  • This breach, which commenced on November 15, 2023, was manufactured doable via the use of compromised credentials that experienced not been improved following a earlier breach at Okta in Oct 2023.
  • Attackers accessed Cloudflare’s internal wiki and bug database, enabling them to see 120 code repositories in Cloudflare’s Atlassian instance.
  • 76 supply code repositories associated to key operational technologies ended up perhaps exfiltrated.
  • Cloudflare detected the danger actor on November 23 simply because the risk actor related a Smartsheet service account to an admin group in Atlassian.
  • SaaS Security GuideCan Your Security Workforce Observe 3rd Party Apps? 60% of Teams Are unable to

    Believe your SaaS security is top rated-notch? Appomni surveyed more than 600 worldwide security practitioners, and 79% of professionals felt the same – yet they faced cybersecurity incidents! Dive into the insights of the AppOmni 2023 Report.

    Find out How You Can

    Risk Actors Progressively Focus on SaaS

    These breaches are element of a broader pattern of nation-point out actors focusing on SaaS service companies, like but not confined to espionage and intelligence collecting. Midnight Blizzard beforehand engaged in important cyber operations, including the 2021 SolarWinds attack.

    These incidents underscore the worth of continual monitoring of your SaaS environments and the ongoing risk posed by sophisticated cyber adversaries concentrating on critical infrastructure and operational tech stack. They also spotlight substantial vulnerabilities related to SaaS identification administration and the requirement for stringent 3rd-party application risk administration techniques.

    Attackers use popular ways, techniques and methods (TTPs) to breach SaaS vendors through the adhering to destroy chain:

  • Preliminary obtain: Password spray, hijacking OAuth
  • Persistence: Impersonates admin, results in additional OAuth
  • Defense Evasion: Remarkably privileged OAuth, no MFA
  • Lateral Movement: Broader compromise of linked applications
  • Details Exfiltration: Grab privileged and sensitive facts out of applications
  • Breaking the SaaS Get rid of Chain

    1 helpful way to split the destroy chain early is with ongoing monitoring, granular plan enforcement, and proactive lifecycle management above your SaaS environments. A SaaS Security Posture Management (SSPM) platform like AppOmni can support with detecting and alerting on:

    • First Accessibility: Out-of-the-box rules to detect credential compromise, including password spraying, brute pressure attacks, and unenforced MFA policies
    • Persistence: Scan and establish OAuth permissions and detect OAuth hijacking
    • Protection Evasion: Entry plan checks, detect if a new identification supplier (IdP) is designed, detect authorization improvements.
    • Lateral Motion: Watch logins and privileged accessibility, detect poisonous combos, and understand the blast radius of a probably compromised account

    Cloudflare-Atlassian Cybersecurity Incidents

    Notice: This expertly contributed post is written by Beverly Nevalga, AppOmni.

    Observed this post fascinating? This article is a contributed piece from 1 of our valued companions. Adhere to us on Twitter  and LinkedIn to go through far more special content we put up.


    Some areas of this article are sourced from:
    thehackernews.com

    Previous Post: «ivanti vulnerability exploited to install 'dslog' backdoor on 670+ it Ivanti Vulnerability Exploited to Install ‘DSLog’ Backdoor on 670+ IT Infrastructures
    Next Post: PikaBot Resurfaces with Streamlined Code and Deceptive Tactics pikabot resurfaces with streamlined code and deceptive tactics»

    Reader Interactions

    Leave a Reply Cancel reply

    Your email address will not be published. Required fields are marked *

    Primary Sidebar

    Report This Article

    Recent Posts

    • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
    • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
    • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
    • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
    • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
    • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
    • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
    • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
    • Non-Human Identities: How to Address the Expanding Security Risk
    • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

    Copyright © TheCyberSecurity.News, All Rights Reserved.