WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Cyber Resilience – As Snowflake Continues to Snowball
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Cyber Resilience – As Snowflake Continues to Snowball

Author: Jennifer Walker

Created: Thursday, June 27, 2024 - 18:48

Categories: Cybersecurity, Security Preparedness

A recent post by Cisco Talos Intelligence considers the many implications and follow-on attacks originating from leaked and/or stolen credentials for the Snowflake cloud data platform and reminds us that this is indicative of a much larger issue. Talos points out that the Snowflake incident isn’t an outlier but is just another incident in the long line of identity access and credential theft incidents.

What happened? Adversaries obtained stolen login credentials for Snowflake accounts acquired via information-stealing malware and used those credentials — which were not protected by multi-factor authentication (MFA) — to infiltrate Snowflake customers’ accounts and steal sensitive information. At this time, it is believed that over 165 organizations may have been impacted.

What’s the larger problem? Infostealers have become a significant threat, and credentials siphoned by infostealers are often used for ransomware attacks, data extortion, and business email compromise (BEC). We’re also observing a shift of cyber criminals increasingly focusing on data exfiltration rather than encryption, presumably as organizations have improved their ransomware response capabilities. As such, MFA has become crucial in protecting against these threats, unfortunately MFA implementation is often inconsistent. Talos emphasizes the need to protect data with MFA, not just assets, especially as more organizations rely on cloud and SaaS platforms.

 To defend against infostealers, Talos’ recommendations are “in fact… quite familiar”:

  1. Implement MFA for all critical data storage
  2. Conduct audits of external data houses
  3. Respond urgently to infostealer infections
  4. Provide vetted password storage solutions for users
  5. Limit access and increase scrutiny for accounts without MFA

For more, check out Snowflake isn’t an outlier, it’s the canary in the coal mine at Talos Intelligence.

Additional resources on the Snowflake activity:

  • UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion | Mandiant
  • Snowflake threat hunting guide | Mandiant
  • CISA: Snowflake Recommends Customers Take Steps to Prevent Unauthorized Access | WaterISAC

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar