Home Security JumpCloud Blames ‘Subtle Nation-State’ Actor for Safety Breach

JumpCloud Blames ‘Subtle Nation-State’ Actor for Safety Breach

by crpt os


Jul 18, 2023THNData Security / Cyber Attack

A little over a week after JumpCloud reset API keys of customers impacted by a security incident, the company said the intrusion was the work of a sophisticated nation-state actor.

The adversary “gained unauthorized access to our systems to target a small and specific set of our customers,” Bob Phan, chief information security officer (CISO) at JumpCloud, said in a post-mortem report. “The attack vector used by the threat actor has been mitigated.”

The U.S. enterprise software firm said it identified anomalous activity on June 27, 2023, on an internal orchestration system, which it traced back to a spear-phishing campaign mounted by the attacker on June 22.

While JumpCloud said it took security steps to shield its network by rotating credentials and rebuilding its systems, it wasn’t until July 5 when it detected “unusual activity” in the commands framework for a small set of customers, prompting a forced-rotation of all admin API keys. The number of affected customers was not disclosed.

Further analysis of the breach, per the company’s disclosure, unearthed the attack vector, which it described as a “data injection into the commands framework.” It also said the attacks were highly targeted.

JumpCloud, however, did not explain how the phishing attack it spotted in June is connected to the data injection. It’s currently not clear if the phishing emails led to the deployment of malware that facilitated the attack.

UPCOMING WEBINAR

Shield Against Insider Threats: Master SaaS Security Posture Management

Worried about insider threats? We’ve got you covered! Join this webinar to explore practical strategies and the secrets of proactive security with SaaS Security Posture Management.

Join Today

Additional indicators of compromise (IoCs) associated with the attack shows that the adversary leveraged domains named nomadpkg[.]com and nomadpkgs[.]com, a likely reference to the Go-based workload orchestrator used to deploy and manage containers.

“These are sophisticated and persistent adversaries with advanced capabilities,” Phan said. JumpCloud has yet to reveal the name and the origins of the group allegedly responsible for the incident.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.





Source link

Related Articles

xxxanti beeztube.mobi hot sexy mp4 menyoujan hentaitgp.net jason voorhees hentai indian soft core chupatube.net youjzz ez2 may 8 2023 pinoycinema.org ahensya ng pamahalaan pakistani chut ki chudai pimpmovs.com www xvedio dost ke papa zztube.mobi 300mbfilms.in صور مص الزب arabporna.net نهر العطش لمن تشعر بالحرمان movierulz plz.in bustyporntube.info how to make rangoli video 穂高ゆうき simozo.net 四十路五十路 ロシアav javvideos.net 君島みお 無修正 افلام سكس في المطبخ annarivas.net فيلم سكس قديم rashmi hot videos porncorn.info audiosexstories b grade latest nesaporn.pro high school girls sex videos real life cam eroebony.info painfull porn exbii adult pics teacherporntrends.com nepali school sex