Settings

Theme

Cloudflare, OKTA Hacked

twitter.com

165 points by marianov 5 years ago · 52 comments

Reader

kentonv 5 years ago

This is Cloudflare's official statement (I work for Cloudflare):

This afternoon we were alerted that the Verkada security camera system that monitors main entry points and main thoroughfares in a handful of Cloudflare offices may have been compromised. The cameras were located in offices that have been officially closed for nearly a year.

As soon as we became aware of the compromise, we disabled the cameras and disconnected them from office networks. No customer data or processes have been impacted by this incident.

This incident emphasizes the importance of the Zero Trust model that Cloudflare follows and provides to customers, which ensures that if any one system or vendor is compromised, it does not compromise the entire organization. Unlike the previous castle-and-moat approach, a Zero Trust model functions more like bulkheads in a ship, making sure that a leak in one place doesn’t sink the entire ship.

  • kentonv 5 years ago

    Incidentally this breach is not specific to Cloudflare, it affects lots of companies:

    https://www.theverge.com/2021/3/9/22322122/verkada-hack-1500...

    Hackers gained access to over 150,000 of [Verkada]’s cameras, including cameras in Tesla factories and warehouses, Cloudflare offices, Equinox gyms, hospitals, jails, schools, police stations, and Verkada’s own offices, Bloomberg reports.

    • fragsworth 5 years ago

      That sounds bad, if you have camera footage of people entering passwords into their computers, you can gain access to lots of other things.

  • xtracto 5 years ago

    Sounds like when someone "hacked" an airplane because they hacked into the OS of the entertainment systems.

    • alasdair_ 5 years ago

      It's been claimed that it was possible to bridge from the entertainment system network to the thrust management system of the aircraft, at least according to the FBI's warrant: https://www.independent.co.uk/news/world/americas/computer-e...

      This sounds silly, of course, but it wouldn't surprise me if someone cheaped out somewhere and connected two networks that should never be connected together.

    • hsbauauvhabzb 5 years ago

      except aircraft are much more likely to implement good network segregation as opposed to 150,000 random companies.

      • ArchOversight 5 years ago

        Most of the entertainment systems on airplanes were an afterthought that was implemented after the fact, not something built-in in the first place.

        • hsbauauvhabzb 5 years ago

          That’s kind of beside the point, any aircraft security staff involved would demand segregation. 150k random companies? Hell, 75% don’t even have security teams.

  • unityByFreedom 5 years ago

    Great! Sounds like "we could have owned half the internet" was hyperbole.

  • pfundstein 5 years ago

    Great pivot into "this illustrates our excellent security".

  • weare138 5 years ago

    >The cameras were located in offices that have been officially closed for nearly a year.

    This explanation begs the obvious question, why were they still connected to Cloudflare's internal network for nearly a year? Does Cloudflare just keep paying rent for 'officially closed' offices? Obviously this ArsonCats group is exaggerating the extent of the hack but this official explanation from Cloudflare doesn't exactly pass the sniff test either.

    • russell_h 5 years ago

      I don’t know about Cloudflare specifically, but almost every Cloudlfare-sized tech company in SF has had their offices closed to employees for a year. Most of them plan to reopen and are continuing to pay rent.

      Under those circumstances it definitely makes sense to keep the cameras on.

      • weare138 5 years ago

        I understand this and that's the point I'm trying to make here. The statement is just deflecting and downplaying the issue. What exactly does 'officially closed' mean? The office wasn't 'officially closed', it was unoccupied because of COVID. It was still paid for by Cloudflare and on it's network. The statement is purposefully misleading.

      • mathattack 5 years ago

        Occam’s razor. The simplest solution....

    • kentonv 5 years ago

      > Does Cloudflare just keep paying rent for 'officially closed' offices?

      Well... yes. We intend to open them again when the pandemic is over.

    • meibo 5 years ago

      Well, you'd also keep your security cameras on when going on vacation, it's just that covid is a lot more painful than a vacation.

    • mrits 5 years ago

      Paying rent for closed offices is common, especially with COVID. Commercial leases aren't usually 1 year like residential.

    • efficax 5 years ago

      It's called a lease, but also it's likely some small numbers of staff visit the offices from time to time

nickysielicki 5 years ago

A couple boxes, likely VLAN'd off, were popped.

Note in both screenshots, copious amounts of 'mmcblk0pXX', that looks like an embedded device. Probably the same cameras this group found vulns in. The idea that those cameras somehow give access to all of cloudflare, or all of OKTA, is wrong and clickbait and sensationalist.

By the way, according to github [1] this girl is in Switzerland. There exist extradition treaties, and she is not operating under a pseudonym. These are publicly traded companies. She could very easily find herself in prison for this.

[1]: https://github.com/deletescape

edit: wording.

jfrunyon 5 years ago

It's very interesting that both Cloudflare and Tesla have the exact same disk setup on such important systems on their corporate networks, down to the numerous strangely small partitions on MMC.

Oh, wait, neither Cloudflare nor Okta were hacked. Crappy IoT devices on their networks - quite likely isolated or untrusted - were hacked.

Frankly if these companies trusted their 'corporate networks', THAT would be the story here. But the fact that someone hacked their cameras was both posted here a few hours ago[1] and not news[2].

[1] https://news.ycombinator.com/item?id=26405056

[2] Seriously! How is "more IoT devices hacked" still a story? It's literally a continuous occurrence. Piss off.

  • plugger 5 years ago

    > quite likely isolated or untrusted - were hacked.

    I disagree. From my experience there are many big corps out there that use VLANs but don't properly secure them. And even if they did I expect pivoting from these hosts would be trivial when compared to getting in externally.

    Finally, these cameras aren't alone. They're often integrated into a centralized controller which has to be routable by both the cameras as well as the host/hosts required to review the footage. So even IF they were properly segmented there's still most likely a path to the 'corp' VLAN.

    • jfrunyon 5 years ago

      Cloudflare publicly states that they use a zero trust networking model. So, you can disagree with the facts all you want, but it won't change them.

      BTW, the central controller for these cameras is "in the cloud". That's how they were hacked. Keep up.

ggreer 5 years ago

A later tweet claims they got access through a vulnerability in the Verkada security cameras used by these companies: https://twitter.com/nyancrimew/status/1369442432639770624

That's not good, but it's bullshit to claim, "if we wanted to we could have probably owned half the internet in like a week." I seriously doubt that any of these companies have their security cameras on the same networks as anything sensitive, let alone production infrastructure. Heck, I doubt that any have their cameras on the same networks as developer machines (which are used on public networks all the time and can have all kinds of dubious software installed on them).

  • kadoban 5 years ago

    If you have security cameras though, doesn't that open up a huge amount of possibilities to deepen the intrusion? Just most obviously you can watch anyone log in to anything you can see and get some credentials that way. Sounds like these offices are closed, but I'm sure there's some clever way to get someone to need to log in to some machine. Or just be patient and wait.

    Hell the offices being closed and having control of the security cameras offers what sounds a lot like the start of a great way to break in quietly and get physical access. How many systems do you know that are secure if you can touch them?

    • ggreer 5 years ago

      You can see the resolution of the cameras in some of the account's other tweets. It's not high enough to see information on the screen. Watching keyboard inputs might be possible, but even then I doubt the framerate is high enough to get all the keys.

      More importantly: at most companies, accessing sensitive systems requires more than just a username and password. Pretty much every place requires TOTP or HOTP, often via a hardware token. Many firms also restrict access to specific machines.

      • kentonv 5 years ago

        Pretty much everything at Cloudflare requires, at the very least, a physical security key (e.g. yubikey) to get access.

      • kadoban 5 years ago

        Yeah 2fa is a good point. You'd really hope that anything important would require it, but not sure that's universally true. Social engineering attacks become a lot easier possibly, 2fa tends to need to be overridden a lot because people lose their tokens.

        I didn't see the low res cameras, that should make it harder. I wouldn't be surprised if AI or tedium (view each frame, guess and check, etc.) could still get you passwords, but yeah it's starting to sound like more of a stretch. If the cameras have sound that should help get creds too.

  • ImprovedSilence 5 years ago

    That twitter account is now suspended. Would it be in relation to them tweeting about this breach..?

vmception 5 years ago

I miss pwn4ge like this, but even this was kind of weak because they didn't do anything funny and also damaging, must be both

all we've gotten this decade were super quiet "state-level actors", and uninspired trolls

I want the "for the lulz" ASCII art pros dropping MIDI music while also pillaging corporations and leaking secrets

make a festival out of it.

I think its coming, a hack that incorporates the best of the latest hacks. Like making a docker disk image of content that was leaked, so that all the other hackers (including the original hacker) have plausible deniability and don't violate the CFAA

jtchang 5 years ago

Devices such as cameras are usually isolated on their on VLAN. In addition just because you are on the network doesn't really mean anything if there is a zero trust security model.

  • irjustin 5 years ago

    Ahhhhhh that was then, this is now. Everything is on the internet unless you're actually serious about security.

    Not a huge deal though, this will hopefully cause them to look at truly closed circuit or isolated cameras.

    CloudFlare & Okta is insane though.

    • rdegges 5 years ago

      Indeed! Here's the official Okta statement (I run Developer Advocacy at Okta):

      The Okta service has not been impacted by the Verkada breach. After conducting further investigation, Okta determined that five Verkada cameras were compromised. These cameras were isolated and separate from Okta’s production and company networks. Okta does not employ facial recognition technology, and there is no evidence that any live streams were viewed during the limited access that occurred. Okta employs Verkada technology only in office entrances.

rdegges 5 years ago

This is Okta's official statement (I run Developer Advocacy at Okta):

The Okta service has not been impacted by the Verkada breach. After conducting further investigation, Okta determined that five Verkada cameras were compromised. These cameras were isolated and separate from Okta’s production and company networks. Okta does not employ facial recognition technology, and there is no evidence that any live streams were viewed during the limited access that occurred. Okta employs Verkada technology only in office entrances.

jffry 5 years ago

See also: this thread from 5 hours ago on the broader topic of the Verkada breach: https://news.ycombinator.com/item?id=26405056

pdx6 5 years ago

Their cameras? Big deal, it is an empty building over at Okta. I thought they meant they got into an Okta cell and I was very interested to hear how that was done.

trungdq88 5 years ago

They have access to Tesla warehouse webcam [1] (or at least they claimed so). Pretty crazy.

[1] https://twitter.com/nyancrimew/status/1369388911693340674

JoshuaMulliken 5 years ago

http://web.archive.org/web/20210310004316/https://twitter.co...

falcolas 5 years ago

Oh, fuck. Cloudflare aside, Okta is huge for enterprise SSO throughout our industry. I can hear our infosec group having kittens as we speak.

  • rdegges 5 years ago

    Heyo, I run Developer Advocacy at Okta. Just FYI, here's our official statement on the news:

    The Okta service has not been impacted by the Verkada breach. After conducting further investigation, Okta determined that five Verkada cameras were compromised. These cameras were isolated and separate from Okta’s production and company networks. Okta does not employ facial recognition technology, and there is no evidence that any live streams were viewed during the limited access that occurred. Okta employs Verkada technology only in office entrances.

0xbadcafebee 5 years ago

> if we wanted to we could have probably owned half the internet in like a week.

Oh, skids. Pop a single shell in a disposable environment in some corporate hellscape cloud infra and they think they can pwn the interwebs. I'm sure you could root some shitty Fargate container of some shitty web app in my company, too, but you literally can't get to any other network from it.

They'll be dining out on this for years on irc. (do the kids still irc? is twitter the new irc?)

Blah blah Twitter makes for crap HN articles etc

post_break 5 years ago

Well we were testing Verkada cameras for the office. Guess they are going back to california tomorrow.

philco 5 years ago

This is going to continue blowing up the cyber insurance insurance market for startups.

xvector 5 years ago

Holy crap. This is huge.

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection