TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

JumpCloud Security Incident Details

19 点作者 vwelling将近 2 年前
As sent out to JumpCloud customers:<p><i>Thank you for your patience and quick action as we worked through our response plans and investigation for a security incident we first alerted you about last week. We remain committed to providing transparent and timely information around this event for our customers, partners, and the industry at large. The security threats that we face, as an industry, are unprecedented and require strong collaboration from all constituents.<p>As a result, today we are publishing details of activity by a sophisticated nation-state sponsored threat actor that gained unauthorized access to our systems to target a small and specific set of our customers. Prior to sharing this information, we notified and worked with the impacted customers. We have also been working with our incident response (IR) partners and law enforcement on both our investigation and steps designed to make our systems and our customers’ operations even more secure. The attack vector used by the threat actor has been mitigated.<p>Now that our customers are informed and we have taken the appropriate steps to eliminate this threat, we are able to share additional details of the incident in an effort to be transparent and help others take appropriate steps to monitor for and protect against this threat.<p>On June 27 at 15:13 UTC we discovered anomalous activity on an internal orchestration system which we traced back to a sophisticated spear-phishing campaign perpetrated by the threat actor on June 22. That activity included unauthorized access to a specific area of our infrastructure. We did not see evidence of customer impact at that time. Out of an abundance of caution, we rotated credentials, rebuilt infrastructure, and took a number of other actions to further secure our network and perimeter. Additionally, we activated our prepared incident response plan and worked with our Incident Response (IR) partner to analyze all systems and logs for potential activity. It was also at this time, as part of our IR plan, that we contacted and engaged law enforcement in our investigation.<p>JumpCloud Security Operations, in collaboration with our IR partners and law enforcement, continued the forensic investigation. On July 5 at 03:35 UTC, we discovered unusual activity in the commands framework for a small set of customers. At this point in time, we had evidence of customer impact and began working closely with the impacted customers to help them with additional security measures. We also decided to perform a force-rotation of all admin API keys beginning on July 5 at 23:11 UTC. We immediately notified customers of this action.<p>Continued analysis uncovered the attack vector: data injection into our commands framework. The analysis also confirmed suspicions that the attack was extremely targeted and limited to specific customers. What we learned allowed us to create and now share a list of IOCs (Indicators of Compromise) (https:&#x2F;&#x2F;jumpcloud.com&#x2F;support&#x2F;july-2023-iocs) that we have observed for this campaign.<p>These are sophisticated and persistent adversaries with advanced capabilities. Our strongest line of defense is through information sharing and collaboration. That’s why it was important to us to share the details of this incident and help our partners to secure their own environments against this threat. We will continue to enhance our own security measures to protect our customers from future threats and will work closely with our government and industry partners to share information related to this threat.<p>If you are a customer with additional questions on this incident, please submit a support ticket in your admin console or reach out to your account manager.<p>Thank you,<p>Robert Phan CISO</i>

3 条评论

twarge将近 2 年前
It’s odd to me that centralized management, especially for macOS, is being forced into an array of small companies like this. I worry that these companies are not big enough to invest in securing against this sort of attack.<p>Why didn’t the macOS Server model work? That at least prevented this sort of centralization. Too bad it was neglected, poor quality software.<p>It’s doubly odd that the US government is pushing so hard for these solutions by requiring things like NIST 800-171 for government work. It puts an enormous bullseye on these management companies.
评论 #36707855 未加载
fastest963将近 2 年前
We have recently switched to JumpCloud and have been very happy. The biggest selling point for us has been their ability to support Mac, Windows, and Linux with a single pane of glass.<p>Over the past week they&#x27;ve been very transparent. They automatically rotated API keys, which I presume was how the attackers were accessing the platform and recommended rotating all SSO certs. Having a vulnerability that led to command runner access is not a great look but they&#x27;ve handled the aftermath very well.
gtirloni将近 2 年前
TIL JumpCloud exists
评论 #36707569 未加载