blog.checkpoint.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://click.checkpoint.com/NzUwLURRSC01MjgAAAGAPeWsDdDPD1MvfOjWbAy2AT2uCHxRfbgxe6lgZ2uAEZuyY81hxQkrpnDvOUmt3SGeayJQJdE=
Effective URL: https://blog.checkpoint.com/2021/09/30/what-can-we-learn-from-the-top-cloud-security-breaches/?mkt_tok=NzUwLURRSC01MjgAAAGAP...
Submission: On October 21 via api from SG — Scanned from DE

Form analysis 1 forms found in the DOM

<form id="search-form"><input type="image" src="https://www.checkpoint.com/wp-content/themes/checkpoint-theme-v2/images/search-btn.png" value="Submit" alt="Search"><input type="text" id="stq" name="stq" class="st-search-input"
    placeholder="Enter your keywords..." x-webkit-speech="" x-webkit-grammar="builtin:search" autocomplete="off">
</form>

Text Content

 * Free Demo
 * Contact Us
 * Support Center
 * Sign In
 * Blog

Toggle navigation

 * * 
 * *  * Choose your language...
      * English (English)
      * Spanish (Español)
      * French (Français)
      * German (Deutsch)
      * Italian (Italiano)
      * Portuguese (Português)
      * Russian (Русский)
      * Japanese (日本語)
      * Chinese (中文)

 * Products
   * Quantum
     Secure the Network
      * Quantum Maestro
      * Quantum Security Gateway
      * Quantum Spark
      * Quantum Scalable Chassis
      * Quantum Edge
      * Quantum IoT Protect
      * Quantum VPN
      * Quantum Smart-1
      * Quantum Smart-1 Cloud
     
     CloudGuard
     Secure the Cloud
      * CloudGuard Network
      * CloudGuard Posture Management
      * CloudGuard Workload
      * CloudGuard AppSec
      * CloudGuard Intelligence
     
     Harmony
     Secure Users & Access
      * Harmony Endpoint
      * Harmony Connect
      * Harmony Browse
      * Harmony Email & Office
      * Harmony Mobile
     
     Infinity-Vision
     Unified Management
      * Infinity Portal
      * Infinity SOC
      * Infinity Unified Management
     
     View All Products
 * Solutions
   *  * Cloud Security
      * Serverless Security
      * Container Security
      * Cloud Compliance & Governance
      * Private Cloud Network Security
      * AWS Security
      * Azure Security
      * GCP Security
     
     
      * Business Size
      * Data Center & High Performance
      * Large Enterprise
      * Small and Medium Business
      * Consumer and Small Business
     
      * Topic
      * Secure Remote Workforce
      * Anti-Ransomware
      * Cloud Security
      * Endpoint Security
      * Enterprise Mobile Security
      * GDPR
      * IoT Security
      * Network Security
      * SD-WAN Security
      * Zero Trust Security
      * Zero-Day Protection
     
      * Industry
      * Retail
      * Financial Services
      * Government
      * Healthcare
      * Industrial Control Systems ICS & SCADA
      * Service Provider
      * Education
     
     --------------------------------------------------------------------------------
     
      * Solutions Overview
     
     Infinity ArchitectureConsolidates Security Across the EnterpriseLearn More
 * Support & Services
   *  * Support
      * Create/View Service Request
      * Contact Support
      * Check Point Pro
      * Support Programs
      * Life Cycle Policy
      * License Agreement & Warranty
      * RMA Policy
     
      * Training
      * Training and Certification
      * Cyber Range Courses
      * HackingPoint Courses
      * Learning Credits
      * Secure Academy
      * Knowledge Base
      * eLearning
     
      * Services
      * Professional Services
      * Advanced Technical Account Management
      * Lifecycle Management Services
      * Security Consulting
      * ThreatCloud Managed Security Service
     
     HackingPoint TrainingLearn hackers inside secrets to beat them at their own
     game.View Courses
 * Partners
   *  * Channel Partners
      * Become a Partner
      * Find a Partner
     
      * Technology Partners
      * Technology Partners
      * Featured Technology Partners
     
      * Partner Portal
      * PartnerMAP Sign In
     
     Check Point Partner EcosystemFrank Rauch,
     Head of Worldwide Channel Sales
     Watch Video
 * Resources
   *  * Resources
      * Content Resource Center
      * Product Demos
      * Product Trials
      * Customer Stories
      * Events
      * Webinars
      * Videos
      * Cyber Hub
     
      * Downloads and Documentation
      * Downloads and Documentation
      * Product Catalog
      * Renewal Pricing Tool
     
      * Cyber Security Insights
      * Check Point Blog
      * Check Point Research
      * Cyber Talk for Executives
      * CheckMates Community
     
     Events
     
     Check out upcoming
     cyber security events
     near your city
     
     Find Out More
 * Mobile Menu
   
   * PRODUCTS
     
     QUANTUM
     
      * Quantum
      * Quantum Maestro
      * Quantum Security Gateway
      * Quantum Spark
      * Quantum Scalable Chassis
      * Quantum Edge
      * Quantum IoT Protect
      * Quantum VPN
      * Quantum Smart-1
      * Quantum Smart-1 Cloud
     
     CLOUDGUARD
     
      * CloudGuard
      * CloudGuard Network
      * CloudGuard Posture Management
      * CloudGuard Workload
      * CloudGuard AppSec
      * CloudGuard Intelligence
     
     HARMONY
     
      * Harmony
      * Harmony Endpoint
      * Harmony Connect
      * Harmony Browse
      * Harmony Email & Office
      * Harmony Mobile
     
     INFINITY-VISION
     
      * Infinity-Vision
      * Infinity Portal
      * Infinity SOC
      * Infinity Unified Management
     
     Products Overview Products A-Z
     
     SOLUTIONS
     
     CLOUD SECURITY
     
      * Serverless Security
      * Container Security
      * Cloud Compliance & Governance
      * Private Cloud Network Security
      * AWS Security
      * Azure Security
      * GCP Security
     
     BUSINESS SIZE
     
      * Data Center & High Performance
      * Large Enterprise
      * Small and Medium Business
      * Consumer and Small Business
     
     TOPIC
     
      * Secure Remote Workforce
      * Anti-Ransomware
      * Cloud Security
      * Endpoint Security
      * Enterprise Mobile Security
      * GDPR
      * IoT Security
      * Network Security
      * SD-WAN Security
      * Zero Trust Security
      * Zero-Day Protection
     
     INDUSTRIES
     
      * Retail
      * Financial Services
      * Government
      * Healthcare
      * Industrial Control Systems ICS & SCADA
      * Service Provider
      * Education
     
     SUPPORT & SERVICES
     
     SUPPORT
     
      * Create Support Request
      * My Support Request
      * Contact Support
      * Check Point Pro
      * Support Programs
      * Life Cycle Policy
      * Software License Agreement & Hardware Warranty
      * RMA Policy
     
     TRAINING
     
      * Training and Certification
      * Learning Credits
      * HackingPoint Courses
      * Secure Academy
      * Knowledge Base
     
     SERVICES
     
      * Professional Services
      * Advanced Technical Account Management
      * Lifecycle Management Services
      * Security Consulting
      * ThreatCloud Managed Security Service
     
     PARTNERS
     
     CHANNEL PARTNERS
     
      * Become a Partner
      * Find a Partner
     
     TECHNOLOGY PARTNERS
     
      * Technology Partners
     
     PARTNER PORTAL
     
      * PartnerMAP Sign In
     
     RESOURCES
     
     RESOURCES
     
      * Content Resource Center
      * Product Demos
      * Product Trials
      * Customer Stories
      * Events
      * Webinars
      * Videos
      * Cyber Hub
     
     DOWNLOADS AND DOCUMENTATION
     
      * Downloads and Documentation
      * Product Catalog
      * Renewal Pricing Tool
     
     CYBER SECURITY INSIGHTS
     
      * Check Point Blog
      * Check Point Research
      * Cyber Talk for Executives
      * CheckMates Community
     
      * Free Demo
      * Contact Us
      * Support Center
      * Sign In
      * Blog
      * 
        

   
 * Check Point Blog


WHAT CAN WE LEARN FROM THE TOP CLOUD SECURITY BREACHES?

By Jonathan Maresky, Cloud Product Marketing Manager, published September 30,
2021

(This blog post was first published in TheNewStack.)

According to Canalys’ recently published review of cybersecurity, there were
more data breaches over the course of 2020 than in the previous 15 years
combined: 300 reported breaches (up 119% from 2019), during which 31 billion
data records were exposed (up 171% over 2019).

There’s no question that the COVID-19 pandemic played an important role in this
dramatic escalation. The sudden jump in the number of employees working from
home created significant challenges in securing remote access to corporate
resources. Also, highly distributed offsite workforces became an ideal target
for social engineering hacking ploys.

Although spending on cybersecurity grew 10% during 2020, this increase fell far
short of accelerated investments in business continuity, workforce productivity
and collaboration platforms. Meanwhile, spending on cloud infrastructure
services was 33% higher than the previous year, spending on cloud software
services was 20% higher, and there was a 17% growth in notebook PC shipments.

In short, cybersecurity spending in 2020 did not keep up with the pace of
digital transformation, creating even greater gaps in organizations’ ability to
effectively address the security challenges introduced by public cloud
infrastructure and modern containerized applications: complex environments,
fragmented stacks and borderless infrastructure, not to mention the
unprecedented speed, agility and scale. See our white paper, Introduction to
Cloud Security Blueprint, for a detailed discussion of cloud security
challenges, with or without a pandemic.

In this blog post, we look at nine of the biggest cloud breaches of 2020, where
“big” is not necessarily the number of data records actually compromised but
rather the scope of the exposure and potential vulnerability. We describe how
these significant breaches happened and provide some key takeaways to help you
make your organization more secure.


1. MISCONFIGURED INTERNAL DATABASE

Microsoft disclosed in January 2020 an incident that occurred in an internal
support analytics database. A change on Dec. 5, 2019, to the database’s network
security group introduced misconfigured security rules. As a result, 250 million
records of support cases were compromised, including email and IP addresses as
well as support case details.

Microsoft assured customers that the breach did not expose any of its commercial
cloud services, and in most cases, the data had been automatically redacted to
remove personal information. However, any loss of customer data has serious
ramifications, such as giving threat actors a wealth of information for future
phishing expeditions. Check Point’s Incident Response Team (CPIRT) has seen a
number of successful phishing attacks with a mission-critical pretext such as
“Your IT Support Mailbox is Full” or “New voice mail: Unable to access
resources.” In the case of this breach, threat actors with access to support
ticket history could mount very targeted phishing attacks aligned with prior
legitimate communications with vendors.

The incident was a wake-up call for Microsoft, and all of us, that network
security rules for internal resources must be subjected to auditing that is as
rigorous as that used for external resources. It is also worth noting that the
exposure was detected by a third party. More than three weeks passed until the
misconfiguration was remediated. Comprehensive measures to detect security rule
misconfigurations and alert security teams in real time are critical to prevent
breaches.


2. UNPROTECTED DATABASE, UNENCRYPTED DATA

On Jan. 30 2020, a security researcher discovered a non-password-protected
database that was accessible to anyone on the internet. The database, which was
part of the corporation’s education platform, contained user emails in plain
text as well as IP addresses, ports, pathways and storage information that
malicious actors could exploit to gain deeper access into the network.
Unencrypted production, audit, error, CMS and middleware logs were also exposed,
creating more possible backdoors into the network.

Estée Lauder remediated the exposure on the same day that it was discovered and
assured its customers that no consumer data was compromised. Despite minimal
damage, there are at least three important lessons that can be learned from this
breach:

 * Effective asset discovery and management are critical to security. Any
   unprotected asset can be a great foothold for threat actors and, as in this
   case, can provide invaluable fodder for future social engineering and
   phishing attacks.
 * Beware of the agility and ease with which cloud resources can be provisioned.
   It should never be at the expense of upholding security best practices such
   as password protection.
 * Data should always be encrypted, even in non-production databases.


3. DATABASE OF SECRETS UNPROTECTED FOR 8 YEARS

Whisper is a secret-sharing smartphone app that has been around since 2012. In
its earlier years, it was a popular platform to share confessions and other
highly personal information under a pseudonym. On March 10, 2020, the story
broke in The Washington Post that security researchers had discovered 900
million Whisper posts and their metadata in an unprotected database. The exposed
data, which went back to 2012, included the user’s age, ethnicity, gender,
hometown, nickname and group memberships.

There is no evidence that the database was ever exploited, and Whisper took it
down immediately after being contacted by The Washington Post. It is truly hard
to fathom how an exposed database from a secret-sharing app could have gone
undetected by the company for so many years.

However, it is apparently not an unusual situation. Our CPIRT colleagues have
learned that servers or services that are exposed by accident are typically the
ones most misconfigured and most out of date with patches. Regular external
attack surface mapping and scanning can help identify such servers and services
and prevent accidental exposure. Perhaps this is also the place to note that in
today’s complex hybrid and multicloud environments, the need for effective
security monitoring is greater than ever before.


4. BIOMETRIC DATA ON AN UNSECURED SERVER

Security researchers informed a Brazilian biometric solutions company in March
2020 that 81.5 million records had been exposed on an unsecured server. The
records included admin (!) login information, employee phone numbers and email
addresses, company emails and binary code related to 76,000 fingerprints, which
could have been used to reverse engineer the fingerprints themselves. Facial
recognition data was also found in the exposed database.

The breach occurred primarily because the company failed to securely configure
the migration of data to a cloud-based database for storage purposes. Our CPIRT
investigators have witnessed several hasty cloud migrations that resulted in
accidental exposure of data or other vulnerabilities. When migrating from a
protected on-premises infrastructure to cloud infrastructure, extraordinary
measures should be taken to secure the application, starting with the same
controls you would apply on-premises such as password protection and data
encryption.


5. FIVE BILLION RECORDS EXPOSED DURING ROUTINE MAINTENANCE

This mega-breach occurred in March 2020 when a service provider temporarily
exposed 5 billion records during routine maintenance. The contractor had shut
down a firewall for about 10 minutes to speed up the migration of an
Elasticsearch database, opening up a window for the internet-indexing service
BinaryEdge to index all the data. During those 10 minutes, a security researcher
was able to access the database via an unprotected port, although he only
succeeded in extracting a very small subset of the records.

The database contained emails and passwords from publicly known data breaches,
data that had been used to notify Keepnet’s customers if they had been
compromised. No company or customer data was exposed, and the records themselves
were all from publicly available threat intelligence resources.

Given the sophistication and agility of threat actors, the Keepnet breach
underscores the importance of constant vigilance, even during routine
maintenance and operations. In the company’s public statement about the
incident, one of the lessons learned was: “We have added [a] threat intelligence
service to our 24/7 monitoring systems and conduct continuous vulnerability
scanning.”

In CPIRT’s experience attackers often gain access to and then spread laterally
through a network because security controls were disabled in favor of
performance. In fact, threat actors look for systems that have exceptional
performance with little or no security controls. A proper security architecture
should consider performance requirements in the early planning and design
stages. This upfront investment saves security management time and resources
over the long term.


6. MISCONFIGURED CLOUD SERVER LEAKS GUEST INFORMATION

In July 2020, MGM Grand Hotels acknowledged the breach of 142 million records
that contained personal information about guests and were being offered for sale
on the dark web. The hacked data included home addresses, contact information,
dates of birth, driver’s license numbers and passport numbers. Luckily, it did
not include financial information, IDs or reservation details.

It is possible that this was part of the same July 2019 breach that became high
profile in February 2020 when 10.6 million records were offered as a free
download on a hacking forum. Unfortunately, the data that was exposed here is
yet another case of giving threat actors everything they need for future
spear-phishing attacks.

The breach was apparently the result of a misconfigured cloud server that was
then accessed without authorization. Considering that most misconfigurations are
the result of human error, the incident highlights the invaluable importance of
automated security workflows to strengthening an organization’s security
posture.


7. UNDETECTED EXFILTRATION OF PERSONAL & FINANCIAL DATA

In September 2020, Warner Media Group (WMG) announced that it was the victim of
a three-month Magecart data-harvesting attack on multiple e-commerce websites
hosted and supported by an external service provider. From April 25 to Aug. 5,
2020, a hacker exfiltrated personal (name, email address, telephone number,
billing and shipping addresses) and credit card information (card number, CVC,
expiration date) entered into the websites while making purchases.

In a class action that was brought against WMG in the wake of the incident,
the plaintiffs wrote “The fact that this breach allegedly went on undetected for
more than three months demonstrates the alleged lack of care taken by Warner
Media Group to secure its customers’ information.” The lesson that WMG learned
the hard way is that next-generation threat-hunting and intelligence
capabilities might have detected the issue more quickly or even pre-empted it.
And advanced data-driven threat forensics is key to accelerating time to
remediation.


8. CRYPTO MINING CAMPAIGN TARGETS KUBERNETES

In June 2020, attackers mounted a successful crypto mining campaign on
compute-intense Kubernetes machine learning nodes on Microsoft Azure. The target
was Kubeflow, an open source project for managing ML tasks in Kubernetes. The
attackers exploited Kubeflow dashboards that were configured more for
convenience than security. These misconfigurations exposed the service to the
internet and allowed unauthorized users to perform Kubeflow operations,
including deploying new containers.

The Azure Security Center confirmed that the attack affected tens of Kubernetes
clusters, but did not specify the scope of the resource hijacking or whether the
attackers were able to exploit the dashboards for other malicious activities.
Given the cloud’s auto-scaling capabilities, it is no wonder that cloud service
providers are a common target of crypto mining campaigns. The victims often only
become aware of the exploit at the end of the month when they receive an
extraordinarily high cloud usage bill.

In any case, it is never advisable to rely solely on the security controls of
your cloud service provider. Every organization must understand its
responsibilities within the shared responsibility model of cloud security and
uphold all best practices related to cloud network security and cloud
configuration compliance.


9. ACCOUNT REGISTRATION INFORMATION EXPOSED TO BUSINESS PARTNERS

In December 2020, Spotify announced that an undisclosed number of account
registration records were accidentally exposed to Spotify business partners. The
sensitive user information to which they may have been able to gain access
included email address, preferred display name, password, gender and date of
birth. The breach resulted from a system vulnerability that was introduced back
in April but not discovered until November.

Automated scans and regular penetration testing could have helped identify these
types of system weaknesses and perhaps prevent the breach. Keeping cloud assets
secure is not just Spotify’s challenge. Of the 300 American CISOs who
participated in the IDC Cloud Security survey in June 2020, the top concerns for
cloud production environments were security misconfigurations (67%), lack of
visibility into access settings and activities (64%), and identity and access
management (IAM) errors (61%). Their top cloud security priorities are
compliance monitoring (78%), authorization and permission management (75%), and
security configuration management (73%). Given these challenges and priorities,
enterprises are looking to third-party security vendors to complement their
cloud provider security tools and services, as well as provide automated and
unified cloud security solutions.


CONCLUSION

Keeping networks and data assets safe is a never-ending battle between security
teams and threat actors. As we have seen in this review of selected 2020 cloud
breaches, poor asset management, security misconfigurations and unencrypted data
are all leading contributors to breaches that can compromise sensitive data and
other resources.

The fact that not all of the exposures described above resulted in damaging
exploits should not be a comfort. The exposure itself is often regarded as a
poor reflection on the organization’s cloud network security and cloud security
management practices. If an organization is the target of continuous attacks, an
exploited vulnerability is eventually going to have significant consequences
like data leakage, application performance degradation or disruption, or
resource hijacking.


WHAT CAN YOU DO?

Reading the Check Point cloud security blog is one easy way to ensure you
up-to-date with industry trends, new technology, best practices and
recommendations from a trusted cloud security advisor.

Get familiar with CloudGuard, Check Point’s multi-layered cloud-native security
platform, which provides you with unified security to automate security
everywhere.

A key foundational layer is cloud network security, where organizations should
deploy virtual security gateways to provide advanced threat prevention, traffic
inspection and micro-segmentation.

If you are migrating to the cloud and evaluating cloud network security
solutions, download the Buyer’s Guide to Cloud Network Security to understand:

 * The top 10 considerations when evaluating and choosing a cloud network
   security solution
 * An overview of Check Point CloudGuard and how it answers the top 10
   considerations
 * The relative benefits of the solutions provided by leading cloud providers
   and third-party security vendors

To read the Forrester Total Economic Impact of CloudGuard Network Security,
where Forrester interviewed a $10B+ US-based healthcare company who uses
CloudGuard to secure their hybrid-cloud deployment and generated a 169% ROI,
click here.

And if you are in the process of planning your migration to the cloud, please
contact us to schedule a demo, and a cloud security expert will help to
understand your needs.


RELATED ARTICLES


KEY TAKEAWAYS FROM THE 2021 GARTNER® MARKET GUIDE FOR MOBILE THREAT DEFENSE


CHECK POINT SOFTWARE AND SPLUNK SHOWCASE AUTOMATED THREAT RESPONSE AT .CONF21
SPLUNK


SOCIAL NOW AMONG TOP THREE SECTORS TO BE IMITATED IN PHISHING ATTEMPTS IN Q3
2021


CHECK POINT SOFTWARE AGAIN EARNS LEADERSHIP SPOT IN G2 NGFW REVIEWS


TOP 10 CONSIDERATIONS WHEN EVALUATING A CLOUD NETWORK SECURITY SOLUTION


CHECK POINT SOFTWARE PREVENTS THEFT OF CRYPTO WALLETS ON OPENSEA, THE WORLD’S
LARGEST NFT MARKETPLACE


SEPTEMBER 2021’S MOST WANTED MALWARE: TRICKBOT ONCE AGAIN TOPS THE LIST


AS BATTLE AGAINST CYBERCRIME CONTINUES DURING CYBERSECURITY AWARENESS MONTH,
CHECK POINT RESEARCH REPORTS 40% INCREASE IN CYBERATTACKS


SECURING AWS LAMBDA FUNCTIONS POWERED BY GRAVITRON2 WITH CHECK POINT CLOUDGUARD
WORKLOAD PROTECTION


DRIVING AUTOMATED THREAT PREVENTION & SECURITY POLICY ORCHESTRATION



--------------------------------------------------------------------------------

Follow Us
WELCOME TO THE FUTURE OF CYBER SECURITY ©1994-2021 Check Point Software
Technologies Ltd. All rights reserved.
Copyright | Privacy Policy


AddThis Sharing Sidebar
Share to FacebookFacebookShare to TwitterTwitterShare to LinkedInLinkedInShare
to RedditRedditShare to EmailEmail
Hide
Show
Close

AddThis

AddThis Sharing
FacebookTwitterLinkedInRedditEmail

We'd like to show you notifications for the latest news and updates.


AllowCancel