Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: UNC5537 Hackers Target Snowflake Databases
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

UNC5537 Hackers Target Snowflake Databases

Highlights

  • Hackers target Snowflake with stolen credentials.

  • Lack of multi-factor authentication exacerbates risks.

  • Coordinated efforts aim to mitigate breaches.

Samantha Reed
Last updated: 11 June, 2024 - 2:46 pm 2:46 pm
Samantha Reed 12 months ago
Share
SHARE

UNC5537 hackers are actively exploiting vulnerabilities in Snowflake customer instances, emphasizing the need for heightened cybersecurity measures. The ongoing attacks highlight the necessity for enhanced credential management and multi-factor authentication protocols to protect sensitive data. These incidents illustrate how attackers capitalize on compromised credentials to infiltrate and exploit cloud environments.

Contents
Extent of Data TheftIOCs

Snowflake is a cloud-based data-warehousing platform launched in 2014 by engineers Benoit Dageville and Thierry Cruanes. The platform allows organizations to store, analyze, and share large volumes of data seamlessly across various services. Known for its scalability and performance, Snowflake was initially launched in Bozeman, Montana, and has since gained traction among businesses for its robust data management capabilities.

Recent findings by cybersecurity researchers reveal that UNC5537 hackers have hijacked Snowflake customer accounts using stolen credentials without employing multi-factor authentication. Malicious actors have infiltrated the system using infostealer malware to amass a significant amount of sensitive data. This data is then publicized for sale, putting victims under pressure to pay to prevent further exposure.

Extent of Data Theft

UNC5537’s campaign, dating back to 2020, targets misconfigured Snowflake instances. The threat actors gain access using compromised credentials obtained via malware. This lack of multi-factor authentication on accounts exacerbates the risk, allowing attackers to conduct data exfiltration activities undetected. Coordination efforts between Mandiant and Snowflake aim to mitigate these breaches.

Investigations indicate that unauthorized access originates from compromised customer credentials rather than system-level hacks within Snowflake’s infrastructure. Numerous instances of client data have been stolen, drawing attention to the critical importance of access controls and credential hygiene within cloud environments.

IOCs

  • Rapeflake
  • DBeaver_DBeaverUltimate
  • Go 1.1.5
  • JDBC 3.13.30
  • JDBC 3.15.0
  • PythonConnector 2.7.6
  • SnowSQL 1.2.32
  • Snowflake UI
  • Snowsight Al

Mandiant and Snowflake’s joint investigation has identified and informed around 165 potentially affected organizations. The effort includes providing advice on detection and protection against such attacks, emphasizing the necessity for stringent credential management protocols.

UNC5537’s use of various infostealer malware since 2020 underscores the persistent threat of credential-based attacks. A significant percentage of breached accounts lacked multi-factor authentication, highlighting a critical vulnerability. These attacks frequently stem from password reuse and infections on personal devices used by contractors accessing client environments.

Enhanced security measures, such as the implementation of multi-factor authentication and regular password rotations, are critical to preventing such breaches. Organizations must also educate employees and contractors on best practices for maintaining credential security.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Treasury Department Stops Crypto Scam Network With Sanctions

Attackers Target Ivanti EPMM Flaws, Breaching Major Sectors

Russian Cyber Group Strikes NATO and Ukraine, Hits Key Sectors

International Sting Disrupts Core Ransomware Infrastructure

Authorities Disrupt DanaBot Cybercrime Network with Global Effort

Share This Article
Facebook Twitter Copy Link Print
Samantha Reed
By Samantha Reed
Samantha Reed is a 40-year-old, New York-based technology and popular science editor with a degree in journalism. After beginning her career at various media outlets, her passion and area of expertise led her to a significant position at Newslinker. Specializing in tracking the latest developments in the world of technology and science, Samantha excels at presenting complex subjects in a clear and understandable manner to her readers. Through her work at Newslinker, she enlightens a knowledge-thirsty audience, highlighting the role of technology and science in our lives.
Previous Article Apple Introduces AI-Powered Writing Tool at WWDC
Next Article MultiRDP Malware Enables Multiple Simultaneous RDP Connections

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Wordle Players Tackle Double Letter Challenge With ‘IDIOM’ Solution
Gaming
Investors Demand Musk Commit to Tesla as Sales Drop
Electric Vehicle Technology
Tesla Tests Compact Model Y Prototype at Fremont Facility
Electric Vehicle
AI Robocall Firms Admit to Voter Intimidation in Biden Case Settlement
Technology
Tesla Schedules Robotaxi and Self-Delivery Launches for June
Electric Vehicle
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?