Snowflake Data Theft via Anodot Breach (48 chars)

Hackers didn't crack Snowflake. They swiped keys from a side door — Anodot. Now, ShinyHunters are extorting over a dozen victims with pilfered data troves.

Illustration of data flowing from Snowflake warehouse through breached Anodot integrator to hacker

Key Takeaways

  • Hackers used stolen Anodot tokens to raid Snowflake accounts, hitting over a dozen firms.
  • No Snowflake vulnerability exploited; third-party supply chain was the entry point.
  • ShinyHunters are extorting victims — expect more SaaS integrator attacks ahead.

Over a dozen companies. That’s how many got hit when hackers raided Snowflake accounts last Friday.

ShinyHunters didn’t touch Snowflake’s core. No zero-days, no exploits in the data warehouse itself. Instead — sneaky bastards — they lifted authentication tokens from a breached SaaS integrator. And most victims? Snowflake users, bleeding data into the dark web.

Snowflake spotted the mess quick. “We recently detected unusual activity within a small number of Snowflake customer accounts linked to a specific third-party integration,” they told BleepingComputer. Locked accounts, notified customers, precautionary guidance. Textbook response. But here’s the rub: their systems stayed pristine. The breach lived elsewhere.

How Anodot Became the Weak Link

Anodot. AI-driven anomaly detection firm, snapped up by Glassbox last November. Sounds innocuous — real-time alerts on revenue dips, transaction spikes. But sources finger them as ground zero. Hackers allegedly camped inside for weeks, scooping tokens that unlocked Snowflake (and a Salesforce fumble).

Think about it. You’re a Snowflake customer, piping data through integrations for analytics magic. Anodot holds your auth tokens — OAuth magic words granting access without passwords. Breach Anodot, and bam: token jackpot. No MFA prompts, no red flags in Snowflake logs until the exfiltration starts.

ShinyHunters crowed about it. Confirmed the Anodot angle to BleepingComputer, boasted dozens of hits Friday. Even tried Salesforce — blocked by their AI sentinels. (A rare win amid Salesforce’s own token-theft spree this year.) They’re extorting now, ransom or dump.

Payoneer dodged the bullet. “We’re aware of a security incident involving a third-party service provider, Anodot. Based on our review, Payoneer has not been impacted.” Others? Mum, or scrambling.

Why This Exposes Cloud’s Dirty Secret

“We immediately launched an investigation and, out of an abundance of caution, locked down potentially impacted customer accounts.”

Snowflake’s quote rings defensive. No vuln on their end — true. But shared responsibility? It’s a myth when third-parties hoard your keys. Remember Okta’s 2022 breach? Hackers hopped via stolen sessions to Cloudflare, 1Password. History rhymes: integrators as the forgotten perimeter.

Here’s my take, absent from the headlines: this isn’t isolated sloppiness. It’s architecture screaming for a rethink. Snowflake’s token model trusts partners implicitly. Revoke on demand? Sure, if you spot the compromise first. But Anodot’s breach simmered undetected. Prediction: by 2026, we’ll see mandates for token TTLs under 24 hours, scoped ruthlessly, with AI guardians on every SaaS hop. ShinyHunters just lit the fuse.

Google’s Threat Intelligence Group nodded — tracking it, mum otherwise. Anodot and Glassbox? Radio silence to queries. Classic.

And the how. Tokens stolen pre-revocation. Attackers replayed them for bulk exports — Snowflake’s speedy queries turned against owners. No brute force; pure credential abuse. Why it worked? Integrators like Anodot live in the blind spot. Customers focus MFA on Snowflake logins, forget the plumbing.

Is Snowflake Still Safe for Your Data?

Short answer: safer than most warehouses, but not bulletproof. No core breach — that’s huge. Competitors like BigQuery, Redshift have eaten worse. Yet this screams: audit your integrations yesterday.

Look, Snowflake’s sprawl — millions of objects, petabytes humming — invites these side-channel hits. Third-parties multiply vectors exponentially. One compromised Anodot serves dozens. Scale that risk across your stack.

Victims spanned cloud storage, SaaS sprawl. But Snowflake dominated. Why? Popularity? Token richness? Or Anodot’s client skew? Unclear. But it underscores: data gravity pulls thieves here.

Extortion’s the endgame. ShinyHunters play patient — leak teasers, squeeze ransoms. Firms weigh silence vs. disclosure. PR spin incoming: “isolated, remediated.” Don’t buy it wholesale.

What Happens Next in Token-Theft Wars?

Expect copycats. Anodot’s playbook — breach obscure integrator, harvest tokens — low barrier, high yield. Salesforce waved them off; others won’t.

Architectural shift looming. Move to workload identity, short-lived certs, zero-trust per API call. Painful migration, but inevitable. Snowflake’ll push it — or eat lawsuits.

One firm downplayed: Payoneer. Others leak soon. ShinyHunters’ site swells with samples. Watch Ticketmaster flashbacks — but colder, calculated.

This isn’t hype. It’s the new normal: SaaS supply chain as battleground. Fortify the veins, not just the heart.


🧬 Related Insights

Frequently Asked Questions

What caused the Snowflake data theft attacks? Tokens stolen from Anodot breach let ShinyHunters access customer accounts without cracking Snowflake.

Did Snowflake get hacked directly? No — their systems were untouched; issue stemmed from third-party integrator compromise.

How can I protect my Snowflake data? Rotate tokens, enforce short TTLs, audit integrations, enable MFA everywhere — and monitor anomalies yourself.

Marcus Rivera
Written by

Tech journalist covering AI business and enterprise adoption. 10 years in B2B media.

Frequently asked questions

What caused the Snowflake data theft attacks?
Tokens stolen from Anodot breach let ShinyHunters access customer accounts without cracking Snowflake.
Did Snowflake get hacked directly?
No — their systems were untouched; issue stemmed from third-party integrator compromise.
How can I protect my Snowflake data?
Rotate tokens, enforce short TTLs, audit integrations, enable MFA everywhere — and monitor anomalies yourself.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.