On October 21st, a prominent threat actor using the username “Satanic” posts a thread in which they seek to sell various databases relating to three major retail companies : Hot Topic, Torrid, and Box Lunch (all of which are founded by Hot Topic).
Looks from the article like it was stolen by infecting the PC of a third party analytics firm user who had privileged access to Hot Topics snowflake data warehouses and didn’t have MFA enabled. That is just inexcusable in this day and age and $100k is a small price for Hot Topics snowflake to pay for that fuck up (assuming the bad actor actually follows through and doesn’t sell the data if HT pays the price set).
Pro tip (or really amateur tip), MFA all the things. Even SMS based MFA is better than no MFA even though it’s not ideal.
Looks from the article like it was stolen by infecting the PC of a third party analytics firm user who had privileged access to Hot Topics snowflake data warehouses and didn’t have MFA enabled. That is just inexcusable in this day and age and $100k is a small price for Hot Topics snowflake to pay for that fuck up (assuming the bad actor actually follows through and doesn’t sell the data if HT pays the price set). Pro tip (or really amateur tip), MFA all the things. Even SMS based MFA is better than no MFA even though it’s not ideal.
You know what’s worse? Without MFA their cyber insurance isn’t covering it. Not this day and age.
i had to access a snowflake account the other day, it had 2 mfa challenges… one from the idp via sso, and then the local snowflake one.
100k is a single fte! peanuts!
I work in snowflake every day, and we have two as well.