Close Menu
TechBrunchTechBrunch
  • Home
  • AI
  • Apps
  • Crypto
  • Security
  • Startups
  • TechCrunch
  • Venture

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

No, Andreessen Horowitz did not post a tweet for Crypto Scam

June 18, 2025

New code for Spotify's apps refers to the much-anticipated “lossless” layer

June 18, 2025

Glitch turns the thread into a literal echo chamber

June 18, 2025
Facebook X (Twitter) Instagram
TechBrunchTechBrunch
  • Home
  • AI

    OpenAI seeks to extend human lifespans with the help of longevity startups

    January 17, 2025

    Farewell to the $200 million woolly mammoth and TikTok

    January 17, 2025

    Nord Security founder launches Nexos.ai to help enterprises move AI projects from pilot to production

    January 17, 2025

    Data proves it remains difficult for startups to raise capital, even though VCs invested $75 billion in the fourth quarter

    January 16, 2025

    Apple suspends AI notification summaries for news after generating false alerts

    January 16, 2025
  • Apps

    New code for Spotify's apps refers to the much-anticipated “lossless” layer

    June 18, 2025

    Glitch turns the thread into a literal echo chamber

    June 18, 2025

    Facebook will soon roll out support for PassKeys for Android and iOS

    June 18, 2025

    Here's the first look at the rebooted digg

    June 18, 2025

    YouTube launches new shopping product stickers for shorts

    June 18, 2025
  • Crypto

    Hackers steal and destroy millions of Iran's biggest crypto exchanges

    June 18, 2025

    Unique, a new social media app

    June 17, 2025

    xNotify Polymarket as partner in the official forecast market

    June 6, 2025

    Circle IPOs are giving hope to more startups waiting to be published to more startups

    June 5, 2025

    GameStop bought $500 million in Bitcoin

    May 28, 2025
  • Security

    According to web surveillance companies, the internet will collapse across Iran

    June 18, 2025

    Pro-Israel hacktivist group claims responsiveness to alleged Iranian bank hacks

    June 17, 2025

    Pro-Israel Hacktivist Group has allegedly blamed for alleged Iranian bank hacks

    June 17, 2025

    As food shortages continue, UNFI says it is recovering from cyberattacks

    June 17, 2025

    UK Watchdog will fine 23andMe over 2023 data breach

    June 17, 2025
  • Startups

    7 days left: Founders and VCs save over $300 on all stage passes

    March 24, 2025

    AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

    March 24, 2025

    20 Hottest Open Source Startups of 2024

    March 22, 2025

    Andrill may build a weapons factory in the UK

    March 21, 2025

    Startup Weekly: Wiz bets paid off at M&A Rich Week

    March 21, 2025
  • TechCrunch

    OpenSea takes a long-term view with a focus on UX despite NFT sales remaining low

    February 8, 2024

    AI will save software companies' growth dreams

    February 8, 2024

    B2B and B2C are not about who buys, but how you sell

    February 5, 2024

    It's time for venture capital to break away from fast fashion

    February 3, 2024

    a16z's Chris Dixon believes it's time to focus on blockchain use cases rather than speculation

    February 2, 2024
  • Venture

    No, Andreessen Horowitz did not post a tweet for Crypto Scam

    June 18, 2025

    Seed Series C: What VCS actually wants from AI startups

    June 18, 2025

    5 days remaining to save up to $210 with TC All Stage Pass

    June 18, 2025

    A comprehensive list of 2025 tech layoffs

    June 17, 2025

    Unlock scaling growth in TC at all stages and earn $210 for an additional 6 days

    June 17, 2025
TechBrunchTechBrunch

What Snowflake isn't telling us about its customer data breach

TechBrunchBy TechBrunchJune 8, 20247 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
Share
Facebook Twitter LinkedIn Pinterest Telegram Email


Snowflake's security issues, following a recent spate of customer data thefts, are, for lack of a better word, snowballing.

After Ticketmaster first linked its recent data breach to cloud data company Snowflake, loan comparison site LendingTree confirmed that its subsidiary QuoteWizard had data stolen from Snowflake.

“We use Snowflake in our business operations and can confirm that Snowflake notified us that data for our subsidiary, QuoteWizard, may have been affected by this incident,” LendingTree spokesperson Megan Greuling told TechCrunch.

“We take these matters seriously. [Snowflake] “We have launched an internal investigation,” the spokesperson said. “At this time, it does not appear that consumers' financial account information or that of our parent company, LendingTree, has been impacted,” the spokesperson added, declining to comment further because the investigation is ongoing.

As affected customers come forward, Snowflake has said little beyond a short statement on its website reiterating that there was no data breach on its systems, but rather that customers simply did not use multi-factor authentication (MFA), a security measure that Snowflake does not enforce on customers or require them to enable by default. Snowflake itself was caught out in the incident, saying that a former employee's “demo” account was compromised because it was protected only by username and password.

Snowflake said in a statement on Friday that it stood by its previous response and that its position “remains unchanged.”Citing an earlier statement on Sunday, Snowflake's Chief Information Security Officer Brad Jones said this was a “targeted attack against users who use single-factor authentication,” using credentials stolen from information-stealing malware or obtained in previous data breaches.

The lack of MFA appears to have allowed cybercriminals to download large amounts of data from Snowflake customer environments that were not protected by additional layers of security.

TechCrunch found earlier this week that hundreds of Snowflake customer credentials had been stolen online by password-stealing malware that infected the computers of employees with access to their employers' Snowflake environments. The number of credentials suggests that Snowflake customers who have not yet changed their passwords or enabled MFA are still at risk.

As TechCrunch continued to cover this story this week, we sent Snowflake more than a dozen questions about the ongoing incident affecting its customers, and Snowflake declined to answer our questions at least six times.

These are some of the questions we are asking and why.

It's not yet clear how many Snowflake customers are affected or whether Snowflake already knows about it.

Snowflake said it had notified a “limited number of Snowflake customers” who it believed may have been affected. Snowflake claims more than 9,800 customers, including technology companies, telecommunications companies and healthcare organizations, according to its website.

Snowflake spokeswoman Danica Stanczak declined to comment on whether the number of affected customers was in the dozens, dozens, hundreds or more.

Despite several reports of customer data breaches this week, we're likely only just beginning to grasp the scale of this incident.

It may not even be clear to Snowflake how many customers are still affected, because the company must rely on its own data, such as logs, or get information directly from affected customers.

It's unclear how quickly Snowflake learned about the intrusion into customer accounts. According to a Snowflake statement, the company became aware of “threat activity” (access to customer accounts and the downloading of their contents) on May 23, but later discovered evidence of the intrusion dating back to mid-April, without specifying a specific time frame, which suggests the company has some reliable data.

But that also leaves open the question of why Snowflake didn't realize that so much customer data had been leaked from its servers until well into May, and, if it did, why it didn't publicly warn customers sooner.

Mandiant, the incident response firm Snowflake brought in to help with customer outreach, told Bleeping Computer in late May that it had already been helping affected organizations for “several weeks.”

It is not yet known what was in the former Snowflake employee's demo account or whether it is related to the customer data breach.

The key line from Snowflake's statement is, “We found evidence that threat actors obtained personal credentials of a former Snowflake employee and accessed their demo account, which did not contain any sensitive data.”

According to a TechCrunch investigation, some of the customer credentials stolen in connection with the information-stealing malware belonged to Snowflake employees at the time.

As we've said before, TechCrunch is not publishing the names of the employees because it's not clear whether they did anything wrong, but the fact that Snowflake failed to enforce MFA, allowing cybercriminals to download data from the then-employee's “demo” accounts using only their usernames and passwords, highlights fundamental problems with Snowflake's security model.

However, it remains unclear what role this demo account played in the theft of customer data, as it is not yet known what data was stored there or whether it included data of other Snowflake customers.

Snowflake declined to comment on what, if any, role the then-Snowflake employee's demo account played in the recent breach of customer information. Snowflake reiterated that the demo account “did not contain any sensitive data,” but repeatedly declined to comment on how the company defines what it considers “sensitive data.”

When asked whether Snowflake considers individuals' personal information to be sensitive data, Snowflake declined to comment.

It's unclear why Snowflake didn't proactively reset passwords or require and enforce the use of MFA on customers' accounts.

It's not uncommon for companies to force reset customers' passwords after a data breach, but when we asked Snowflake, they said no breach had occurred. That may be true in the sense that there was no obvious breach of their central infrastructure, but Snowflake's customers have been compromised.

Snowflake is advising customers to reset and rotate their Snowflake credentials and enforce MFA on all accounts. Snowflake previously told TechCrunch that customers are responsible for their own security: “Under Snowflake's shared responsibility model, customers are responsible for enforcing MFA for their users.”

However, because these thefts of Snowflake customer data involve the use of stolen usernames and passwords for accounts that were not protected by MFA, it is unusual that Snowflake has not stepped in on behalf of its customers to secure their accounts by resetting passwords or enforcing MFA.

This is not unprecedented: last year, cybercriminals scraped 6.9 million user and genetic records from 23andMe accounts that weren't protected by MFA. 23andMe took the precaution of resetting user passwords to prevent further scraping attacks, and has since mandated the use of MFA on all user accounts.

When asked whether it plans to reset passwords on customer accounts to prevent further intrusions, Snowflake declined to comment.

Snowflake is moving toward MFA by default, according to Snowflake CEO Sridhar Ramaswamy in an interview this week with tech news site Runtime, which Snowflake CISO Jones later confirmed in an update on Friday.

“We are also developing plans to require customers to implement advanced security controls, such as multi-factor authentication (MFA) and network policies, for particularly privileged Snowflake customer accounts,” Jones said.

No deadline was given for the plan.

Do you know more about the Snowflake account breach? Let us know. You can contact this reporter on Signal and WhatsApp at +1 646-755-8849, or by email. You can also send files and documents via SecureDrop.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

According to web surveillance companies, the internet will collapse across Iran

June 18, 2025

Pro-Israel hacktivist group claims responsiveness to alleged Iranian bank hacks

June 17, 2025

Pro-Israel Hacktivist Group has allegedly blamed for alleged Iranian bank hacks

June 17, 2025

As food shortages continue, UNFI says it is recovering from cyberattacks

June 17, 2025

UK Watchdog will fine 23andMe over 2023 data breach

June 17, 2025

Observability Startup Coralogix is ​​an extension of Unicorn, Eye India

June 17, 2025

Leave A Reply Cancel Reply

Top Reviews
Editors Picks

7 days left: Founders and VCs save over $300 on all stage passes

March 24, 2025

AI chip startup Furiosaai reportedly rejecting $800 million acquisition offer from Meta

March 24, 2025

20 Hottest Open Source Startups of 2024

March 22, 2025

Andrill may build a weapons factory in the UK

March 21, 2025
About Us
About Us

Welcome to Tech Brunch, your go-to destination for cutting-edge insights, news, and analysis in the fields of Artificial Intelligence (AI), Cryptocurrency, Technology, and Startups. At Tech Brunch, we are passionate about exploring the latest trends, innovations, and developments shaping the future of these dynamic industries.

Our Picks

No, Andreessen Horowitz did not post a tweet for Crypto Scam

June 18, 2025

New code for Spotify's apps refers to the much-anticipated “lossless” layer

June 18, 2025

Glitch turns the thread into a literal echo chamber

June 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

© 2025 TechBrunch. Designed by TechBrunch.
  • Home
  • About Tech Brunch
  • Advertise with Tech Brunch
  • Contact us
  • DMCA Notice
  • Privacy Policy
  • Terms of Use

Type above and press Enter to search. Press Esc to cancel.