Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Cloudflare Hacked By Suspected State-Sponsored Threat Actor (securityweek.com) 19

wiredmikey writes: Web security and CDN giant Cloudflare said it was hacked by a threat actor using stolen credentials to access internal systems, code repositories, along with an AWS environment, as well as Atlassian Jira and Confluence. The goal of the attack, Cloudflare says, was to obtain information on the company's infrastructure, likely to gain a deeper foothold.

According to Cloudflare, more than 5,000 individual production credentials were rotated following the incident, close to 5,000 systems were triaged, test and staging systems were physically segmented, and every machine within the Cloudflare global network was reimaged and rebooted.

This discussion has been archived. No new comments can be posted.

Cloudflare Hacked By Suspected State-Sponsored Threat Actor

Comments Filter:
  • by Anonymous Coward

    "Hacked by Suspected State-Sponsored Threat Actor"

    Does this actor get an Oscar or a Grammy?

  • Maybe someone smarter than me can explain how they could have done better. Getting hacked is pretty much a "when" not "if" scenario, and it appears they had somewhat effective security playbooks limiting the attack. If they were aware of the OKTA attack, then there may have been an opportunity to reset any compromised tokens & passwords, but otherwise, it looks like their response was normal.

    • Re:Success story? (Score:4, Informative)

      by sweintraub ( 108358 ) on Friday February 02, 2024 @11:00AM (#64208268) Homepage
      "The stolen login information, an access token and three service account credentials, were not rotated following the Okta incident"
    • Well the biggest problem at this point is lack of diversification. If millions of IT operations are going to use Cloudflare that's where all the attacks will be.

      Extrapolate, consider, and come to your own conclusion.

    • Maybe someone smarter than me can explain how they could have done better. Getting hacked is pretty much a "when" not "if" scenario, and it appears they had somewhat effective security playbooks limiting the attack. If they were aware of the OKTA attack, then there may have been an opportunity to reset any compromised tokens & passwords, but otherwise, it looks like their response was normal.

      Reasonable question: you can never prevent all attacks, but CloudFlare has a long history of having security as an afterthought and if you've ever dealt with them, you'd not be surprised that reckless and bad things happen. Their reputation is not very great and news articles like this reinforce that.

  • Is that why for the past week or so I keep getting those useless messages in the current latest Firefox ?

    Your browser is out of date! Update your browser to view this website correctly. More Information.

    And that's for any sites that use Cloudflare. Just changing the user agent to anything else (or back) and refreshing will give me the wanted page, but it's a PITA.

    • On one particular web site this week I received the message Cloudflare was running some type of security check to verify me. Which is completely bonkers since it's a public site I use on a daily basis and doesn't require any type of account to use.

      It never did clear on the day I wanted to use the site, but was no longer present the next day and thereafter.

      • by Anonymous Coward

        On one particular web site this week I received the message Cloudflare was running some type of security check to verify me. Which is completely bonkers since it's a public site I use on a daily basis and doesn't require any type of account to use.

        All connections entering the cloudflare network are checked against a trust score ranking, and handled with different limitations for negative scores.
        It happens on the tcp/udp level.

        It took them a couple days to restore the old scoring data.
        Now you know what the experience is for people in IP blocks never seen by them before and ranked as an "unknown"

  • by bill_mcgonigle ( 4333 ) * on Friday February 02, 2024 @03:27PM (#64208962) Homepage Journal

    What are people doing with UEFI rootkit infections? Reimage and reboot doesn't cut it.

    I don't see why CloudFlare sent its Sao Paulo equipment back to the vendor.

    Maybe that's why Merck tried to get its insurer to pay $1.4B to replace 40,000 devices?

  • Seriously, you're supposed to be "experts" at Web Security. Watch all the customers disappear faster than a Zeigried and Roy Tiger.

"It's the best thing since professional golfers on 'ludes." -- Rick Obidiah

Working...