{"id":2813,"date":"2023-01-14T22:27:45","date_gmt":"2023-01-14T22:27:45","guid":{"rendered":"https:\/\/entertainment.runfyers.com\/index.php\/2023\/01\/14\/circleci-says-hackers-stole-encryption-keys-and-customers-secrets\/"},"modified":"2023-01-14T22:27:45","modified_gmt":"2023-01-14T22:27:45","slug":"circleci-says-hackers-stole-encryption-keys-and-customers-secrets","status":"publish","type":"post","link":"https:\/\/entertainment.runfyers.com\/index.php\/2023\/01\/14\/circleci-says-hackers-stole-encryption-keys-and-customers-secrets\/","title":{"rendered":"CircleCI says hackers stole encryption keys and customers&#8217; secrets"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p id=\"speakable-summary\">CircleCi, a software company whose products are popular with developers and software engineers, confirmed that some customers\u2019 data was stolen in a <a href=\"https:\/\/techcrunch.com\/2023\/01\/05\/circleci-breach\/\" target=\"_blank\" rel=\"noopener\">data breach<\/a> last month.<\/p>\n<p>The company <a href=\"https:\/\/circleci.com\/blog\/jan-4-2023-incident-report\" target=\"_blank\" rel=\"noopener\">said in a detailed blog post<\/a> on Friday that it identified the intruder\u2019s initial point of access as an employee\u2019s laptop that was compromised with malware, allowing the theft of session tokens used to keep the employee logged in to certain applications, even though their access was protected with two-factor authentication.<\/p>\n<p>The company took the blame for the compromise, calling it a \u201csystems failure,\u201d adding that its antivirus software failed to detect the token-stealing malware on the employee\u2019s laptop.<\/p>\n<p>Session tokens allow a user to stay logged in without having to keep re-entering their password or re-authorizing using two-factor authentication each time. But a stolen session token allows an intruder to gain the same access as the account holder without needing their password or two-factor code. As such, it can be difficult to differentiate between a session token of the account owner, or a hacker who stole the token.<\/p>\n<p>CircleCi said the theft of the session token allowed the cybercriminals to impersonate the employee and gain access to some of the company\u2019s production systems, which store customer data.<\/p>\n<p>\u201cBecause the targeted employee had privileges to generate production access tokens as part of the employee\u2019s regular duties, the unauthorized third party was able to access and exfiltrate data from a subset of databases and stores, including customer environment variables, tokens, and keys,\u201d said Rob Zuber, the company\u2019s chief technology officer. Zuber said the intruders had access from December 16 through January 4.<\/p>\n<p>Zuber said that while customer data was encrypted, the cybercriminals also obtained the encryption keys able to decrypt customer data. \u201cWe encourage customers who have yet to take action to do so in order to prevent unauthorized access to third-party systems and stores,\u201d Zuber added.<\/p>\n<p>Several customers have already informed CircleCi of unauthorized access to their systems, Zuber said.<\/p>\n<p>The post-mortem comes days after the company <a href=\"https:\/\/techcrunch.com\/2023\/01\/05\/circleci-breach\/\" target=\"_blank\" rel=\"noopener\">warned customers to rotate \u201cany and all secrets\u201d<\/a> stored in its platform, fearing that hackers had stolen its customers\u2019 code and other sensitive secrets used for access to other applications and services.<\/p>\n<p>Zuber said that CircleCi employees who retain access to production systems \u201chave added additional step-up authentication steps and controls,\u201d which should prevent a repeat-incident, likely by way of <a href=\"https:\/\/techcrunch.com\/2018\/12\/25\/cybersecurity-101-guide-two-factor\/\" target=\"_blank\" rel=\"noopener\">using hardware security keys<\/a>.<\/p>\n<p>The initial point of access \u2014 the token-stealing on an employee\u2019s laptop \u2014 bears some resemblance to how the password manager giant LastPass was hacked, which also involved an intruder targeting an employee\u2019s device, though it\u2019s not known if the two incidents are linked. LastPass confirmed in December that its <a href=\"https:\/\/techcrunch.com\/2022\/12\/22\/lastpass-customer-password-vaults-stolen\/\" target=\"_blank\" rel=\"noopener\">customers\u2019 encrypted password vaults<\/a> were stolen in an earlier breach. LastPass said the intruders had initially compromised <a href=\"https:\/\/techcrunch.com\/2022\/12\/14\/parsing-lastpass-august-data-breach-notice\/\" target=\"_blank\" rel=\"noopener\">an employee\u2019s device and account access<\/a>, allowing them to break into LastPass\u2019 internal developer environment.<\/p>\n<p><em>Updated headline to better reflect the customer data that was taken.<\/em><\/p>\n<\/p><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/techcrunch.com\/2023\/01\/14\/circleci-hackers-stole-customer-source-code\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CircleCi, a software company whose products are popular with developers and software engineers, confirmed that some customers\u2019 data was stolen in a data breach last month. The company said in a detailed blog post on Friday that it identified the intruder\u2019s initial point of access as an employee\u2019s laptop that was compromised with malware, allowing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14],"tags":[],"class_list":{"0":"post-2813","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"_links":{"self":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/2813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=2813"}],"version-history":[{"count":0,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/2813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/2814"}],"wp:attachment":[{"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=2813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=2813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/entertainment.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=2813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}