TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Segment Security Incident

125 pointsby sandisover 5 years ago

13 comments

erichurkmanover 5 years ago
&gt; For a small subset of customers (13), the unauthorized party was able to gain read-only access to their workspaces and click around in their accounts for up to a few minutes. These customers have been notified.<p>That implies that Segment employees, or a subset, have unfettered access to view their customers&#x27; accounts? That it didn&#x27;t require positive customer assent to gain access?<p>I like Box&#x27;s model for this: <a href="https:&#x2F;&#x2F;community.box.com&#x2F;t5&#x2F;Working-with-Box-Support&#x2F;Box-Product-Support&#x2F;ta-p&#x2F;20124#grantaccess" rel="nofollow">https:&#x2F;&#x2F;community.box.com&#x2F;t5&#x2F;Working-with-Box-Support&#x2F;Box-Pr...</a>
评论 #20888488 未加载
评论 #20891206 未加载
评论 #20888529 未加载
评论 #20889306 未加载
zarothover 5 years ago
In all the SaaS type applications I’ve ever developed, the privileged “Admin Panel” functionality is always on a private network accessible only via VPN access, which is authenticated via a password + private key. Then the Admin Panel itself has its own separate login, which is username + password.<p>Ideally the private key for the VPN is a hardware token, but I will admit in most cases it’s simply a file on the drive.<p>The Admin Panel has zero third party JavaScript nor client-side analytics.<p>I’m not sure this buys quite as much security as it might appear, because there’s probably any number of ways to piggyback on a valid session.<p>For example, there was a bug bounty Tesla paid out when a researcher was able to establish XSS by mangling their car name, which was read via the API and showed up in an internal dashboard as unescaped HTML.<p>So I think the biggest attack surface for Admin Panels remains a hostile client seeding XSS into unescaped fields, and CSP helps a great deal with this, but at the very least I don’t see any reason why these panels should be on a public URL.<p>You can say, well, they should have MFA on the panel, but I can’t shake the feeling that these simple measures avoid a huge number of attackers looking for low-hanging fruit.<p>It’s like putting SSH on a non-standard port. It’s theoretically meaningless but practically it’s a huge improvement, if only because it helps attack signals stand out against the script kiddie noise.
评论 #20888113 未加载
nrmitchiover 5 years ago
Between this and CircleCI, this sounds like a targeted credential-stuffing attack against accounts on Segment. If this is the case, it sounds like the only two cases that have been detected are Segment (detected on August 31st through unknown means), and CircleCI (detected on August 31st through an automated email).<p>Has the risk of of other Segment accounts having been compromised through the same channel (but have yet to be detected) been investigated?
评论 #20887809 未加载
teamspiritover 5 years ago
&gt; Removed privileged access controls internally, adding accounts on an as-needed basis<p>I believe this is critical. Access controls really should be set as needed, per user, and fine grain. While it can be time consuming and may not even make sense at the beginning of a project, doing everything this way from the start should help to keep an organization better secured in the long run.
评论 #20894241 未加载
eranationover 5 years ago
&quot;Enforced mandatory Multi-Factor Authentication (MFA) for all employees when accessing Segment-owned workspaces and performing administrative actions in the Segment app.&quot;<p>This should always be step #1, don&#x27;t wait for an incident.
评论 #20890129 未加载
评论 #20888823 未加载
评论 #20889310 未加载
superzadehover 5 years ago
It is a bit strange, they mention that write keys have been accessed, but they don&#x27;t seem to have invalidated them, or even recommend to update them?<p><pre><code> Information about how Segment customers interact with different aspects of our product, *including customer write keys for Segment*, integration names, workspace names, and how customers interact with our user interface.</code></pre>
评论 #20887382 未加载
评论 #20887052 未加载
sunadenover 5 years ago
I&#x27;m just awaiting the conspiracy theories including both CircleCI and Segment
评论 #20887338 未加载
评论 #20887144 未加载
评论 #20887842 未加载
umviover 5 years ago
&gt; we took immediate action, disabling and deleting the account that was compromised<p>Since this was a privileged account, how can they be sure the attacker didn&#x27;t use said account to setup more ways to get back in? That&#x27;s the first thing Kevin Mitnick always did when he pwned a box: setup alternative routes to get in, in case his original door got closed.
评论 #20887880 未加载
评论 #20887561 未加载
dmixover 5 years ago
&gt; This data is used by our product, marketing, and customer success teams<p>It always seems to be the marketing analytics data that&#x27;s wide open for &#x27;hackers&#x27;.<p>You could spend all day building a secure DB and application architecture then have the marketing team upload analytics for everything onto some random insecure service.<p>Maybe the marketing&#x2F;data teams need to get some security lessons as part of their training the way programmers learn?
评论 #20887871 未加载
Nextgridover 5 years ago
This is why I’m against third-party analytics in any app&#x2F;service. Someone compromising the analytics provider can get a lot of data from app end-users even across different apps that use the same analytics service.
zer0faithover 5 years ago
This is why you NEVER expose elevated access to the open internet.<p>Why all the down votes... this is a legitimate security issue.
评论 #20890272 未加载
评论 #20887771 未加载
wildtomatoover 5 years ago
Looks like the whole site is down. Anyone save a copy?
评论 #20887222 未加载
评论 #20887565 未加载
mindfulplayover 5 years ago
Seeing way too many &quot;incidents&quot; these days ....<p>I would like at least one company to post an &quot;incident&quot; reveal in a more honest way:<p>&quot; Due to our carelessness and relatively insecure practices, we had improperly disclosed user accounts to a moderately savvy hacker. We realize this is our fault.<p>If you&#x27;d like to help and given that we have your attention now, it would be valuable if you can help pentest our servers: the attacker used a simple SQL attack based on an unpatched server via CVE-3245. Are we missing anything else? Please let us know.<p>Thank you.&quot;
评论 #20887796 未加载