Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Compromised AWS API Key Allowed Access to Imperva Customer Data

Imperva has shared more information on how hackers managed to obtain information on Cloud Web Application Firewall (WAF) customers, and revealed that the incident involved a compromised administrative API key.

Imperva has shared more information on how hackers managed to obtain information on Cloud Web Application Firewall (WAF) customers, and revealed that the incident involved a compromised administrative API key.

California-based Imperva revealed in late August that it had become aware of a security incident affecting customers of its Cloud WAF product, formerly known as Incapusla. An initial investigation revealed that the breach impacted customers who had accounts through September 15, 2017.

The compromised database stored email addresses, hashed and salted passwords, API keys and TLS keys.

Imperva revealed last week that it learned of the compromised data on August 20 after being contacted by someone who had requested a bug bounty. The investigation launched by the company revealed — based on a detailed analysis of logs — that the data was actually exfiltrated in October 2018.

“We compared the SQL dump in the provided dataset to our snapshots and found a match. As of this post, we can say that the elements of customer data defined above were limited to Cloud WAF accounts prior and up to September 15, 2017. Databases and snapshots for our other product offerings were not exfiltrated,” explained Kunal Anand, CTO of Imperva.

Imperva says the incident is related to the process of adopting cloud technologies and migrating its user database to AWS. This process started in 2017 in response to an increasing number of customers.

At the time, Imperva developers created a customer database snapshot for testing and an internal compute instance that had been accessible from the outside. The internal compute instance contained an AWS API key, which got stolen after the instance was compromised. The attackers then used that API key to access the customer database snapshot.

The cybersecurity firm has highlighted that the data exfiltration did not involve a vulnerability in one of its products.

Advertisement. Scroll to continue reading.

Imperva says 13,000 passwords have been changed, more than 13,500 SSL certificates have been rotated, and roughly 1,400 API keys were regenerated after it notified customers of the incident and advised them to take measures. The company says it has found no evidence of malicious account activity related to this incident.

“Thus far, we have not found any malicious behavior targeting our customers (logins, rule changes, etc.) and have implemented procedures to continue monitoring for such activity. We remain vigilant, however, and will continue to monitor for malicious behavior,” Anand said.

Related: Russian Hackers Claim Breach of Three U.S. Anti-Virus Companies

Related: Researchers Claim They Bypassed Cylance’s AI-Based Antivirus

Related: Attack on Software Firm Was Sophisticated, Highly Targeted

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

Cloud security firm Mitiga has appointed Charlie Thomas as Chief Executive Officer.

Cynet announced the appointment of Jason Magee as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.