Article Details
Scrape Timestamp (UTC): 2024-02-01 20:54:34.224
Original Article Text
Click to Toggle View
Cloudflare hacked using auth tokens stolen in Okta attack. Cloudflare disclosed today that its internal Atlassian server was breached by a 'nation state' attacker who accessed its Confluence wiki, Jira bug database, and Atlassian Bitbucket source code management system. The threat actor first gained access to Cloudflare's self-hosted Atlassian server on November 14 and then accessed the company's Confluence and Jira systems following a reconnaissance stage. "They then returned on November 22 and established persistent access to our Atlassian server using ScriptRunner for Jira, gained access to our source code management system (which uses Atlassian Bitbucket), and tried, unsuccessfully, to access a console server that had access to the data center that Cloudflare had not yet put into production in São Paulo, Brazil," the company said. To access its systems, the attackers used one access token and three service account credentials stolen during a previous compromise linked to Okta's breach from October 2023 that Cloudflare failed to rotate (out of thousands were leaked during the Okta compromise). Cloudflare detected the malicious activity on November 23, severed the hacker's access in the morning of November 24, and its cybersecurity forensics specialists began investigating the incident three days later, on November 26. The company says that this breach did not impact Cloudflare customer data or systems; its services, global network systems, or configuration were also unaffected. "Even though we understand the operational impact of the incident to be extremely limited, we took this incident very seriously because a threat actor had used stolen credentials to get access to our Atlassian server and accessed some documentation and a limited amount of source code," Cloudflare said. "Based on our collaboration with colleagues in the industry and government, we believe that this attack was performed by a nation state attacker with the goal of obtaining persistent and widespread access to Cloudflare's global network." On October 18, 2023, Cloudflare's Okta instance was also breached using an authentication token stolen from Okta's support system. Following the incident, the company said that its Security Incident Response Team's quick response contained and minimized the impact on Cloudflare systems and data and that no Cloudflare customer information or systems were impacted.
Daily Brief Summary
Cloudflare reported a breach of its internal Atlassian server by a nation state attacker who accessed the company's Confluence wiki and Jira bug database.
The attackers gained initial access on November 14, then established persistent access and accessed Bitbucket source code management on November 22.
Stolen credentials from the October 2023 Okta breach were used to penetrate Cloudflare's systems; this includes one access token and three service account credentials.
Cloudflare detected and cut off the hacker's access between November 23 and 24, with a thorough investigation starting on November 26.
Despite the breach, Cloudflare customer data, services, and global network systems remained secure and unaffected.
The incident is taken seriously by Cloudflare, although operational impact is considered limited due to limited access to documentation and source code.
The attack is believed to be a nation-state effort aiming to gain long-term access to Cloudflare's global network; the Security Incident Response Team's quick actions minimized impact.