Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Snowflake Data Exfiltration CR #1257

Merged
merged 7 commits into from
Jul 9, 2024
Merged

Snowflake Data Exfiltration CR #1257

merged 7 commits into from
Jul 9, 2024

Conversation

arielkr256
Copy link
Contributor

@arielkr256 arielkr256 commented Jun 10, 2024

snowflake data exfiltration

Background

In April 2024, Mandiant received threat intelligence on database records that were subsequently determined to have originated from a victim’s Snowflake instance. Mandiant notified the victim, who then engaged Mandiant to investigate suspected data theft involving their Snowflake instance. During this investigation, Mandiant determined that the organization’s Snowflake instance had been compromised by a threat actor using credentials previously stolen via infostealer malware. The threat actor used these stolen credentials to access the customer’s Snowflake instance and ultimately exfiltrate valuable data. At the time of the compromise, the account did not have multi-factor authentication (MFA) enabled. https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion/

Changes

  • 3 new scheduled rules/queries for signal creation
  • new correlation rule for Snowflake data exfil

Testing

  • reproduced in lab environment
  • pat validate

@arielkr256 arielkr256 requested a review from a team as a code owner June 10, 2024 20:57
Copy link

😱
looks like some things could be wrong with the packs

[INFO][root]: ignoring file dependabot.yml

@arielkr256 arielkr256 marked this pull request as draft June 10, 2024 20:58
@arielkr256 arielkr256 changed the title scheduled rules and correlation rule for Snowflake Data Exfiltration CR Jun 10, 2024
@casey-r-hill
Copy link

@arielkr256 - does this require a customer to perform a SF share of 'SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY' before running these?

@arielkr256
Copy link
Contributor Author

@arielkr256 - does this require a customer to perform a SF share of 'SNOWFLAKE.ACCOUNT_USAGE.QUERY_HISTORY' before running these?

@casey-r-hill for SF connected yes, similar to this guidance. For SaaS it should already have those permissions.

Evan Gibler and others added 4 commits July 9, 2024 13:45
* Update Action versions; use SHAs

* Add dependabot.yml to keep Actions updated

* Update PAT to 0.49.0
snowflake data exfiltration
@le4ker le4ker force-pushed the snowflake-data-exfil branch from 8f907e6 to eecb93c Compare July 9, 2024 10:57
@arielkr256 arielkr256 marked this pull request as ready for review July 9, 2024 18:05
Copy link
Contributor

@ben-githubs ben-githubs left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me!

@ben-githubs ben-githubs merged commit aea5a39 into release Jul 9, 2024
6 checks passed
@ben-githubs ben-githubs deleted the snowflake-data-exfil branch July 9, 2024 19:31
@arielkr256 arielkr256 added the correlation_rules Correlation rules establish correlations across logs, identify anomalies, and model complex attack b label Sep 26, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
correlation_rules Correlation rules establish correlations across logs, identify anomalies, and model complex attack b
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants