this post was submitted on 01 Feb 2024
67 points (98.6% liked)

Technology

59589 readers
3332 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] eager_eagle@lemmy.world 23 points 9 months ago

tl;dr of the damage

no Cloudflare customer data or systems were impacted by this event. Because of our access controls, firewall rules, and use of hard security keys enforced using our own Zero Trust tools, the threat actor’s ability to move laterally was limited. [...] No services were implicated, and no changes were made to our global network systems or configuration.

The only production systems the threat actor could access using the stolen credentials was our Atlassian environment. Analyzing the wiki pages they accessed, bug database issues, and source code repositories, it appears they were looking for information about the architecture, security, and management of our global network; no doubt with an eye on gaining a deeper foothold.

[–] neshura@bookwormstory.social 5 points 9 months ago

I appreciate them communicating this because as far as I can tell they had no obligation to reveal this hack since no customer data was implicated.

[–] lazynooblet@lazysoci.al 4 points 9 months ago

They was a really good read