• Wed. Oct 11th, 2023

Hackers Targeted the Cloud Platform of JumpCloud and Stole its Users’ Data

Avatar photo

ByEsme Greene

Aug 23, 2023
Hackers targeted JumpCloud, stealing user data
Esme Greene
Latest posts by Esme Greene (see all)

She was the target of a hacker assault last month, according to a report made last week by the identity and access management service provider JumpCloud. The hackers broke into the JumpCloud servers and stole data from a few clients using the spear-phishing approach.

JumpCloud asserts that the threat has been neutralized and that the attack vector used by the attackers to “target a small and specific group” of clients has already been neutralized. Inevitably, neither the size of the leak nor if client data were taken were disclosed by the organization.

In accordance with our incident response strategy, we acted right away to minimize the danger and secure our network and perimeter when the occurrence was discovered. JumpCloud released a statement saying, “We quickly notified impacted consumers and informed law enforcement. “Our team is constantly on the lookout for fresh threats, and we have faith in our people and security measures.”

The Breach Found

According to reports, JumpCloud discovered suspicious behavior in its internal control system on June 27. She connected it to a spear-phishing assault that happened on June 22 just a few days previously. JumpCloud altered credentials, reorganized the infrastructure, and took further measures to tighten the security of its network even though there was no indication of a consumer effect at the time.

However, the business started to observe effects on its clients’ data on July 5. After conducting an internal investigation, the organization discovered suspicious activity on the internal network and reset all administrators’ API keys. Customers have to replace all third-party connectors with new keys as a result of this.

It is clear that the attacker had access to JumpCloud systems for approximately two weeks based on the time between the breach and the proven impact on consumers.

Bob Fan, JumpCloud’s chief information security officer, described the opponents as “complex, persistent, and highly capable.” “Continued study has identified data injection into our team’s platform as a significant attack vector. 

The Investigation

The investigation also demonstrated how narrowly focused and constrained the assault was to a small number of clients,” Fan continued. For the benefit of impacted clients, JumpCloud has also disclosed known symptoms of compromise, enabling them to recognize fraudulent behavior on their networks.

 
Avatar photo

Esme Greene

Esme brings a wealth of knowledge and experience to our website, specializing in all aspects of DarkWeb security. With a deep understanding of the intricate workings of the DarkWeb and its associated cybersecurity risks, Esme curates insightful and informative content for our readers.