TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Rollbar Had a Data Breach

17 点作者 jguimont超过 1 年前
On September 6, 2023 at 8:28AM PDT, we identified an irregularity in our data warehouse query logs. We immediately performed an initial forensic analysis, determining what had occurred and conducting initial assessment of the impact.<p>Our preliminary analysis established that a cloud platform service account which only had access to our data warehouse was used by an unauthorized party. When we became aware of this access we disabled the service account and began analyzing what actions had been taken by the unauthorized party. The party first tried to launch compute resources, and after that failed for lack of permission, they accessed the data warehouse and ran searches that suggested they were interested in Bitcoin wallets or other cloud credentials. Our investigation indicates this access occurred from August 9, 2023 to August 11, 2023. We will also engage a third-party forensic consultant to assist us in verifying these findings, and that work is ongoing.<p>Our analysis of the incident continues, but we are contacting you now because our initial forensic analysis indicates the unauthorized party accessed data about your account, including:<p>Usernames and user email addresses Account name Project and environment names Project access tokens Project service link configuration<p>We are taking the following actions: Project access tokens with &#x27;read&#x27; or &#x27;write&#x27; scope: these tokens could allow access to your Rollbar project data (occurrences, items, etc). These tokens have been expired. You can refresh each token using the Rollbar UI, API, or Terraform provider.<p>Project access tokens with &#x27;post_server_item&#x27; scope: these tokens could allow access to send data into your project (but not read data). These tokens will be expired in 30 days.<p>Although our investigation is ongoing, we hold the security of our customers data paramount and are therefore writing to promptly notify you of the discovery and the steps we have taken.<p>Please feel free to contact us using the information below if you have any additional questions or if there is further information we can provide.<p>Sincerely, Brian Rue, Co-founder and CEO

2 条评论

twistedpair超过 1 年前
Should API access keys be stored in plain text such that they can easily be recovered from backups or clones to data warehouses?<p>Best practice would be to store such keys in an encrypted state, to prevent such breaches from non-production datasource access, or _even_ direct production database access.
jtokoph超过 1 年前
Why aren’t they taking an action to not copy access tokens to their data warehouse? They could also start hashing them with an additional application salt that wouldn’t be available in the database if someone only had db access