Governance & Risk Management , Multi-factor & Risk-based Authentication , Password & Credential Management
Breach-Weary Snowflake Moves to MFA, 14-Character Passwords
New Security Measures Follow High-Profile Hacks of Snowflake CustomersCloud-based data warehousing platform Snowflake has rolled out default multifactor authentication - as well as a 14-character password minimum - to shore up security in the wake of a series of cyberattacks in June that hit high-profile customers including Santander Bank, Advance Auto Parts, the Los Angeles Unified School District and luxury retailer Neiman Marcus.
See Also: Protect Your Amazon S3 Data: Why Versioning, Replication, and AWS Backup are Not Enough
Attackers compromised the Bozeman, Montana-based company's third-party environment and used stolen credentials to steal from Snowflake customer tenants, download their files and demand $5 million in exchange for a promise to delete stolen data (see: Snowflake Hacking Spree Puts 165 Organizations at Risk).
The company on Friday announced new security measures related to authentication for accounts created in October, including MFA, longer passwords and no repeat passwords.
"Multifactor authentication will be enforced by default for all human users in any Snowflake account created in October 2024," the company said, adding that the changes will help ensure the platform is "more secure by default," with a goal of eliminating "password-only sign-ins."
For Snowflake service users are advised to they rely on OAuth token verification or key pair authentication while connecting to the platform from external sources like data visualization tools PowerBI, dbt Labs and Tableau.
Details of the attacks first emerged on May 30, after data stolen from Live Nation Entertainment's Ticketmaster appeared for sale on the criminal marketplace BreachForums (see: Snowflake Clients Targeted With Credential Attacks).
The hacks were blamed on credential stuffing in which attackers reuse username and password pairs stolen or otherwise obtained from other services or data leaks. An analysis of the attack by Google Mandiant attributed the hacks to a financially motivated threat group it tracks as UNC5537.
Snowflake introduced some security features in July to strengthen the use of multifactor authentication, including giving administrators the ability to mandate that all of their Snowflake account user must employ strong authentication and the release of free-to-use tools that allow administrators to track credential theft, overprivileged accounts and "stale users" that no longer require access to the service (see: After Customers Get Breached, Snowflake Refines Security).
Snowflake did not immediately respond to a request for comment. The company on Friday said its recent efforts align with the Cybersecurity and Infrastructure Security Agency's Secure By Design Pledge, which calls on cloud services, on-premises software and other software manufacturers to design products with greater built-in security.