
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 09:39:02 GMT</lastBuildDate>
        <item>
            <title><![CDATA[The impact of the Salesloft Drift breach on Cloudflare and our customers]]></title>
            <link>https://blog.cloudflare.com/response-to-salesloft-drift-incident/</link>
            <pubDate>Tue, 02 Sep 2025 17:10:00 GMT</pubDate>
            <description><![CDATA[ An advanced threat actor, GRUB1, exploited the integration between Salesloft’s Drift chat agent and Salesforce to gain unauthorized access to Salesforce tenants of Cloudflare and many other companies. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On August 23rd, Cloudflare was notified that we (and our customers) are affected by the Salesloft Drift breach. Because of this breach, someone outside Cloudflare got access to our Salesforce instance, which we use for customer support and internal customer case management, and some of the data it contains. Most of this information is customer contact information and basic support case data, but some customer support interactions may reveal information about a customer's configuration and could contain sensitive information like access tokens. Given that Salesforce support case data contains the contents of support tickets with Cloudflare, any information that a customer may have shared with Cloudflare in our support system—including logs, tokens or passwords—should be considered compromised, and we strongly urge you to rotate any credentials that you may have shared with us through this channel. </p><p>As part of our response to this incident, we did our own search through the compromised data to look for tokens or passwords and found 104 Cloudflare API tokens. We have identified no suspicious activity associated with those tokens, but all of these have been rotated in an abundance of caution. All customers whose data was compromised in this breach have been informed directly by Cloudflare.</p><p>No Cloudflare services or infrastructure were compromised as a result of this breach.</p><p>We are responsible for the choice of tools we use in support of our business. This breach has let our customers down. For that, we sincerely apologize. The rest of this blog gives a detailed timeline and detailed information on how we investigated this breach.</p>
    <div>
      <h2>The Salesloft Drift breach</h2>
      <a href="#the-salesloft-drift-breach">
        
      </a>
    </div>
    <p>Last week, Cloudflare became aware of suspicious activity within our Salesforce tenant and learned that we, as well as hundreds of other companies, had become the target of a threat actor that was able to successfully exfiltrate the text fields of support cases from our Salesforce instance. Our security team immediately began an investigation, cut off the threat actor’s access, and took a number of steps, detailed below, to secure our environment. We are writing this blog to detail what happened, how we responded, and to help our customers and others understand how to protect themselves from this incident.</p><p>Cloudflare uses Salesforce to keep track of who our customers are and how they use our services, and we use it as a support tool to interact with our customers. An important detail to understand as part of this incident is that the threat actor only accessed data in Salesforce “cases,” which may be created when Cloudflare sales and support team members need to comment to each other internally in order to support our customers; they are also created when customers interact with Cloudflare support. Salesforce had an integration with the Salesloft Drift chatbot, which Cloudflare used to give anyone who visited our website a way to contact us.</p><p>As Salesloft has <a href="https://trust.salesloft.com/?uid=Drift%2FSalesforce+Security+Update"><u>announced</u></a>, a threat actor breached their systems. As part of the breach, the threat actor was able to obtain OAuth credentials associated with the Salesloft Drift chat agent’s Salesforce integration to exfiltrate data from Salesloft customers’ Salesforce instances. Our investigation revealed that this was part of a sophisticated supply chain attack targeting business-to-business third-party integrations, affecting hundreds of organizations globally that were customers of Salesloft. <a href="https://www.cloudflare.com/en-au/application-services/products/cloudforceone/"><u>Cloudforce One</u></a>—Cloudflare’s threat intelligence &amp; research team—has classified the advanced threat actor as <b>GRUB1</b>. Additional disclosures from <a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift"><u>Google’s Threat Intelligence Group</u> </a>aligned with the activity we observed in our environment.</p><p>Our investigation showed the threat actor compromised and exfiltrated data from our Salesforce tenant between August 12-17, 2025, following initial reconnaissance observed on August 9, 2025. A detailed analysis confirmed the exposure was limited to Salesforce case objects, which primarily consist of customer support tickets and their associated data within our Salesforce tenant. These case objects contain customer contact information related to the support case, case subject lines, and the body of the case correspondence—but <i>not</i> any attachments to the cases. Cloudflare does not request or require customers to share secrets, credentials, or API keys in support cases. However, in some troubleshooting scenarios, customers may paste keys, logs, or other sensitive information into the case text fields. Anything shared through this channel should now be considered compromised.</p><p>We believe this incident was not an isolated event but that the threat actor intended to harvest credentials and customer information for future attacks. Given that hundreds of organizations were affected through this Drift compromise, we suspect the threat actor will use this information to launch targeted attacks against customers across the affected organizations. </p><p>This post provides a timeline of the attack, details our response, and offers security recommendations to help other organizations mitigate similar threats.</p><p><i>Throughout this blog post, all dates and times are in UTC.</i></p>
    <div>
      <h2>Cloudflare's response and remediation</h2>
      <a href="#cloudflares-response-and-remediation">
        
      </a>
    </div>
    <p>When Salesforce and Salesloft notified us on August 23, 2025, that the Drift integration had been abused across multiple organizations, including Cloudflare, we immediately launched a company-wide Security Incident Response. We activated cross-functional teams, pulling together experts from Security, IT, Product, Legal, Communications, and business leadership under a single, unified incident command structure.</p><p>We set up four clear priority workstreams with the goal to protect our customers and Cloudflare:</p><ol><li><p><b>Immediate Threat Containment:</b> We cut off all threat actor access by disabling the compromised Drift integration, conducted forensic analysis to understand the scope of the compromise, and eliminated the active threat from our environment.</p></li><li><p><b>Secure our third-party ecosystem</b>: We immediately disconnected all third-party integrations from Salesforce. We issued new secrets for all services and implemented a new process to rotate them weekly.</p></li><li><p><b>Safeguard the integrity of our wider systems</b>: We expanded credential rotation to all our third-party Internet services and accounts as a precautionary measure to prevent the attacker from using compromised data to access other Cloudflare systems.</p></li><li><p><b>Customer Impact Analysis:</b> We analyzed our Salesforce case objects data to identify whether customers could be compromised and to ensure they received timely and accurate communication about potential exposure.</p></li></ol>
    <div>
      <h2>Attack timeline &amp; Cloudflare response</h2>
      <a href="#attack-timeline-cloudflare-response">
        
      </a>
    </div>
    <p>Our forensic investigation reconstructed the threat actor’s activities against Cloudflare, which occurred between August 9 and August 17, 2025. The following is a chronological summary of the threat actor's actions, including initial reconnaissance prior to the initial compromise.</p>
    <div>
      <h3>August 9, 2025: First signs of reconnaissance</h3>
      <a href="#august-9-2025-first-signs-of-reconnaissance">
        
      </a>
    </div>
    <p>At <b>11:51</b>, GRUB1 attempted to validate a Customer Cloudflare-issued API token to the Salesforce API. The actor used Trufflehog (a popular open-source secrets scanner) as their User-Agent and sent a verification request to <code>client/v4/user/tokens/verify</code>. The request failed with a <code>404 Not Found</code>, confirming the token was invalid. The source of this API token is unclear—it could have been obtained from various sources including other Drift customers that GRUB1 may have compromised prior to Cloudflare. </p>
    <div>
      <h3>August 12, 2025: Initial compromise of Cloudflare</h3>
      <a href="#august-12-2025-initial-compromise-of-cloudflare">
        
      </a>
    </div>
    <p>At <b>22:14</b>, GRUB1 gained access to Cloudflare’s Salesforce tenant by using a stolen credential used by the Salesloft integration. Using this credential, the GRUB1 logged in from the IP address <code>44[.]215[.]108[.]109</code> and made a GET request to the <code>/services/data/v58.0/sobjects/</code> API endpoint. This action appeared to enumerate all objects in our Salesforce environment, giving the threat actor a high-level overview of the data stored there.</p>
    <div>
      <h3>August 13, 2025: Expanding reconnaissance</h3>
      <a href="#august-13-2025-expanding-reconnaissance">
        
      </a>
    </div>
    <p>One day after the initial breach, the threat actor GRUB1 launched a subsequent attack from the same IP address, <code>44[.]215[.]108[.]109</code>. Starting at <b>19:33</b>, the threat actor stole customer data from the Salesforce case objects. They first re-ran an object enumeration to confirm the data structure, then immediately retrieved the case objects’ schema using the <code>/sobjects/Case/describe/</code> endpoint. This was followed by a broad Salesforce query that enumerated fields from the Salesforce case object.</p>
    <div>
      <h3>August 14, 2025: Understanding our Salesforce environment</h3>
      <a href="#august-14-2025-understanding-our-salesforce-environment">
        
      </a>
    </div>
    <p>The threat actor GRUB1 dedicated hours to conduct comprehensive reconnaissance of Cloudflare's Salesforce tenant from the IP address <code>44[.]215[.]108[.]109</code>. It appears their objective was to build an understanding of our environment. For several hours, they executed a series of targeted <a href="#detailed-event-timeline">queries</a>:</p><ul><li><p><b>00:17 - </b>They measured the tenant's scale by counting accounts, contacts, and users; </p></li><li><p><b>04:34 - </b>Analyzed case workflows by querying CaseTeamMemberHistory; and </p></li><li><p><b>11:09 - </b>Confirmed they were in a production environment by fingerprinting the Organization object. </p></li></ul><p>The threat actor completed their reconnaissance with additional queries to understand how our customer support system operates—including how team members handle different types of cases, how cases are assigned and escalated, and how our support processes work—and then queried the /limits/ endpoint to learn the API's operational thresholds. The queries run by GRUB1 provided them with insight into their level of access, the size of the case objects, and the precise API limits they needed to respect to avoid detection within our Salesforce environment.</p>
    <div>
      <h3>August 16, 2025: Preparing for the operation</h3>
      <a href="#august-16-2025-preparing-for-the-operation">
        
      </a>
    </div>
    <p>Following the reconnaissance on August 14, 2025, we observed no traffic or successful logins from the threat actor GRUB1 for nearly 48 hours.  </p><p>They returned on August 16, 2025. At <b>19:26</b>, GRUB1 logged back into Cloudflare’s Salesforce tenant from the IP address <code>44[.]215[.]108[.]109</code> and, at <b>19:28</b>, executed a single, final query: <code>SELECT COUNT() FROM Case</code>. This action served as a final "dry run" to verify the exact size of the dataset they were about to steal, marking the definitive end of the reconnaissance phase and setting the stage for the main attack. </p>
    <div>
      <h3>August 17, 2025: Final exfiltration and coverup</h3>
      <a href="#august-17-2025-final-exfiltration-and-coverup">
        
      </a>
    </div>
    <p>GRUB1 initiated the data exfiltration phase by switching to new infrastructure, logging in at <b>11:11:23</b> from the IP address <code>208[.]68[.]36[.]90</code>. After performing one final check on the size of the case object, they launched a Salesforce Bulk API 2.0 job at <b>11:11:56</b>. In just over three minutes, they successfully exfiltrated a dataset containing the text of support cases—but not any attachments or files—in our instance of Salesforce. At <b>11:15:42</b>, GRUB1 attempted to cover their tracks by deleting the API job. While this action concealed the primary evidence, our team was able to reconstruct the attack from residual logs. </p><p>We observed no further activity from this threat actor after August 17, 2025.</p>
    <div>
      <h3>August 20, 2025: Vendor action ahead of notification</h3>
      <a href="#august-20-2025-vendor-action-ahead-of-notification">
        
      </a>
    </div>
    <p>Salesloft revoked Drift-to-Salesforce connections across its customer base and published a notice on their website. At that point, Cloudflare had not yet been notified, and we had no indication that this vendor action might relate to our environment.</p>
    <div>
      <h3>August 23, 2025: Salesforce and Salesloft notifications to Cloudflare</h3>
      <a href="#august-23-2025-salesforce-and-salesloft-notifications-to-cloudflare">
        
      </a>
    </div>
    <p>Our response to this incident began when Salesforce and Salesloft notified us of unusual Drift-related activity.  We promptly implemented the vendors' recommended containment steps and engaged them to gather intelligence. </p>
    <div>
      <h3>August 25, 2025: Cloudflare initiates response activity</h3>
      <a href="#august-25-2025-cloudflare-initiates-response-activity">
        
      </a>
    </div>
    <p>By August 25, we had received additional intelligence about the incident and escalated our response beyond the initial vendor-recommended containment steps. We launched our own comprehensive investigation and remediation effort.</p><p>Our first priority was cutting off GRUB1's access at the source. We disabled the Drift user account, revoked its client ID and secrets, and completely purged all Salesloft software and browser extensions from Cloudflare systems. This comprehensive removal mitigated the risk of the threat actor reusing compromised tokens, regaining access through stale sessions, or leveraging software extensions for persistence.

Separately, we expanded our security review to include all third-party services connected to our Salesforce environment, rotating credentials as a precautionary measure to prevent any potential lateral movement by the threat actor. </p><p>Since we use Salesforce as our primary tool for managing our customer support data, the risk was that customers had submitted secrets, passwords, or other sensitive data in their customer service requests. We needed to understand what sensitive material the attacker now had. </p><p>We immediately focused on whether any of that data could have been used to compromise our customers accounts, systems, or infrastructure. We examined the data obtained by the threat actor to see if it contained exposed credentials, since cases include freeform text fields where customers may submit Cloudflare API tokens, keys, or logs to our support team. Our teams developed custom scanning tools using regex, entropy, and pattern-matching techniques to detect likely Cloudflare secrets at scale. </p><p>Our investigation confirmed that the exposure was strictly limited to the freeform text in Salesforce case objects—not attachments or files. Cases are used by sales and support teams to communicate internally about customer support issues and to communicate directly with customers. As a result, these case objects contained text-only data consisting of:</p><ul><li><p>The subject line of the Salesforce case</p></li><li><p>The body of the case (freeform text which may include any correspondence including keys, secrets, etc., if provided by the customer to Cloudflare)</p></li><li><p>Customer contact information (for example, company name, requestor email address and phone number, company domain name, and company country)</p></li></ul><p>This conclusion was validated through extensive reviews of integrations, authentication activity, endpoint telemetry, and network logs.</p>
    <div>
      <h3>August 26–29, 2025: Scaling the response and proactive measures</h3>
      <a href="#august-26-29-2025-scaling-the-response-and-proactive-measures">
        
      </a>
    </div>
    <p>While the primary Salesforce and Salesloft credentials had already been rotated, our next step was to terminate and securely re-establish our third-party integrations. We began methodically re-onboarding the terminated services, ensuring each was provisioned with new secrets and subject to stricter security controls.</p><p>Meanwhile, our teams continued to analyze the data that was exfiltrated. Based on the analysis, we triaged &amp; validated potential exposures, operating under the principle that any data that could have been exposed, was examined. This enabled us to take direct action by rotating Cloudflare platform-issued tokens immediately upon discovery—a total of 104 API tokens were rotated. No suspicious activity has been identified related to those tokens. </p>
    <div>
      <h3>September 2, 2025: Customers notified<b> </b></h3>
      <a href="#september-2-2025-customers-notified">
        
      </a>
    </div>
    <p>Based on Cloudflare’s detailed analysis—all impacted customers were formally notified via email and banner notices in our Dashboard with information about the incident and recommended next steps. </p>
    <div>
      <h2>Recommendations for all organizations</h2>
      <a href="#recommendations-for-all-organizations">
        
      </a>
    </div>
    <p>This incident highlights the critical need for heightened vigilance in securing SaaS applications and other third-party integrations. The data compromised across hundreds of companies targeted in this attack could be used to launch additional attacks. We strongly urge all organizations to adopt the following security measures:</p><ul><li><p><b>Disconnect Salesloft and its applications:</b> Immediately disconnect all Salesloft connections from your Salesforce environment and uninstall any related software or browser extensions.</p></li><li><p><b>Rotate credentials:</b> Reset the credentials for all third-party applications and integrations connected to your Salesforce instance. Rotate any credentials that may have been previously shared in a support case to Cloudflare. Based on the scope and intent of this attack, we also recommend rotating all third party credentials in your environment as well as any credentials that may have been included in a support case with any other vendor. </p></li><li><p><b>Implement frequent credential rotation:</b> Establish a regular rotation schedule for all API keys and other secrets used in your integrations to reduce the window of exposure.</p></li><li><p><b>Review support case data: </b>Review all customer support case data with your third-party providers to identify what sensitive information may have been exposed. Look for cases containing credentials, API keys, configuration details, or other sensitive data that customers may have shared. For Cloudflare customers specifically: you can access your support case history through the Cloudflare dashboard under <code>Support &gt; Get Help &gt; Technical Support &gt; My Activities</code>, where you can filter cases or use the "Download Cases" feature to conduct a comprehensive review.</p></li><li><p><b>Conduct forensics:</b> <b> </b>Review access logs and permissions to all third-party integrations and review <a href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift"><u>public materials</u></a> associated with the Drift incident and conduct a security review of your environment as appropriate.</p></li><li><p><b>Enforce least privilege:</b> Audit all third-party applications to ensure they operate with the minimum level of access (least privilege) required for their function and ensure that admin accounts are not used for vendors. Additionally, enforce strict controls like IP address restrictions and session binding on all third-party and business-to-business (B2B) connections.</p></li><li><p><b>Enhance monitoring and controls:</b> Deploy enhanced monitoring to detect anomalies such as large data exports or logins from unfamiliar locations. While capturing third party to third party logs can be difficult, it is imperative that these logs are part of your security operations teams.</p></li></ul>
    <div>
      <h2>Indicators of compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    <p>Below are the Indications of Compromise (IOCs) that we saw from GRUB1. We are publishing them so that other organizations, and especially those that may have been impacted by the Salesloft breach, can search their logs to confirm the same threat actor did not access their systems or third parties.</p><table><tr><th><p><b>Indicator</b></p></th><th><p><b>Type</b></p></th><th><p><b>Description</b></p></th></tr><tr><td><p>208[.]68[.]36[.]90</p></td><td><p>IPV4</p></td><td><p>DigitalOcean based infrastructure </p></td></tr><tr><td><p>44[.]215[.]108[.]109</p></td><td><p>IPV4</p></td><td><p>AWS based infrastructure </p></td></tr><tr><td><p>TruffleHog</p></td><td><p>User Agent</p></td><td><p>Open source Secret Scanning tool</p></td></tr><tr><td><p>Salesforce-Multi-Org-Fetcher/1.0</p></td><td><p>User Agent</p></td><td><p>User-Agent string linked to malicious tooling</p></td></tr><tr><td><p>Salesforce-CLI/1.0</p></td><td><p>User Agent</p></td><td><p>Salesforce Command Line Interface (CLI),</p></td></tr><tr><td><p>python-requests/2.32.4</p></td><td><p>User Agent</p></td><td><p>User agent may indicate custom scripting </p></td></tr><tr><td><p>Python/3.11 aiohttp/3.12.15</p></td><td><p>User Agent</p></td><td><p>User agent which may allow many API calls in parallel</p></td></tr></table>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>We are responsible for the tools that we select and when those tools are compromised by sophisticated threat actors, we own the consequences. Our team responded to the notice, and our investigation confirmed that the impact was strictly limited to data in Salesforce case objects, with no compromise of other Cloudflare systems or infrastructure.</p><p>That said, we consider the compromise of <i>any</i> data to be unacceptable. Our customers trust Cloudflare with their data, their infrastructure, and their security. In turn, we sometimes place our trust in third-party tools which need to be monitored and carefully scoped in what they can access. We are responsible for this. We let our customers down. For this, we sincerely apologize.</p><p>As third-party tools increasingly integrate with internal corporate data across the industry, we need to approach each new tool with careful scrutiny. This incident affected hundreds of organizations through a single integration point, highlighting the interconnected risks in today's technology landscape. We are committed to developing new capabilities to help us and our customers defend against such attacks in the future—stay tuned for announcements during Cloudflare's Birthday Week later this month.</p><p>We are also committed to sharing threat intelligence and research with the broader security community. In the weeks ahead, our Cloudforce One team will publish an in-depth blog analyzing GRUB1’s tradecraft to support the broader community in defending against similar campaigns.</p>
    <div>
      <h2>Detailed event timeline</h2>
      <a href="#detailed-event-timeline">
        
      </a>
    </div>
    <p>The following table provides a granular, chronological view of GRUB1's specific actions during the incident.</p><table><tr><th><p><b>Date/Time (UTC)</b></p></th><th><p><b>Event Description</b></p></th></tr><tr><td><p><b>2025-08-09 11:51:13</b></p></td><td><p>GRUB1 observed leveraging Trufflehog and attempting to verify a token against a Cloudflare Customer Tenant: <code>client/v4/user/tokens/verify</code>, and received a 404 error from <code>44[.]215[.]108[.]109</code></p></td></tr><tr><td><p><b>2025-08-12 22:14:08</b></p></td><td><p>GRUB1 logged into Cloudflare’s Salesforce tenant from <code>44[.]215[.]108[.]109</code></p></td></tr><tr><td><p><b>2025-08-12 22:14:09</b></p></td><td><p>GRUB1 sent a <code>GET</code> request for a list of objects in Cloudflare’s Salesforce tenant: <code>/services/data/v58.0/sobjects/</code></p></td></tr><tr><td><p><b>2025-08-13 19:33:02</b></p></td><td><p>GRUB1 logged into Cloudflare’s Salesforce tenant from <code>44[.]215[.]108[.]109</code></p></td></tr><tr><td><p><b>2025-08-13 19:33:03</b></p></td><td><p>GRUB1 sent a <code>GET</code> request for a list of objects in Cloudflare's Salesforce tenant: <code>/services/data/v58.0/sobjects/</code></p></td></tr><tr><td><p><b>2025-08-13 19:33:07 and 19:33:09</b></p></td><td><p>GRUB1 sent a <code>GET</code> request for metadata information for case in Cloudflare’s Salesforce tenant: <code>/services/data/v58.0/sobjects/Case/describe/</code></p></td></tr><tr><td><p><b>2025-08-13 19:33:11</b></p></td><td><p>GRUB1 first observed executing Salesforce query: A broad query against the case object by <code>44[.]215[.]108[.]109</code>. This produced one of the earliest and larger data responses, consistent with reconnaissance via bulk record retrieval</p></td></tr><tr><td><p><b>2025-08-14 0:17:40</b></p></td><td><p>GRUB1 lists available objects and counts <code>“Account”</code>, <code>“Contact”</code> and <code>“User”</code> objects.</p></td></tr><tr><td><p><b>2025-08-14 00:17:47</b></p></td><td><p>GRUB1 queried Account table in Cloudflare’s Salesforce tenant: <code>“SELECT COUNT() FROM Account”</code> query on Cloudflare’s Salesforce tenant</p></td></tr><tr><td><p><b>2025-08-14 00:17:51</b></p></td><td><p>GRUB1 queried Contact table in Cloudflare’s Salesforce tenant: <code>“SELECT COUNT() FROM Contact”</code> query on Cloudflare’s Salesforce tenant</p></td></tr><tr><td><p><b>2025-08-14 00:18:00</b></p></td><td><p>GRUB1 queried User table in Cloudflare’s Salesforce tenant: <code>“SELECT COUNT() FROM User”</code> query on Cloudflare’s Salesforce tenant</p></td></tr><tr><td><p><b>2025-08-14 04:34:39</b></p></td><td><p>GRUB1 queried "CaseTeamMemberHistory” in Cloudflare’s Salesforce tenant: <code>“SELECT Id, IsDeleted, Name, CreatedDate, CreatedById, LastModifiedDate, LastModifiedById, SystemModstamp, LastViewedDate, LastReferencedDate, Case__c FROM CaseTeamMemberHistory__c LIMIT 5000”</code></p></td></tr><tr><td><p><b>2025-08-14 11:09:14</b></p></td><td><p>GRUB1 queried Organization table in Cloudflare’s Salesforce tenant: <code>“SELECT Id, Name, OrganizationType, InstanceName, IsSandbox FROM Organization LIMIT 1”</code></p></td></tr><tr><td><p><b>2025-08-14 11:09:21</b></p></td><td><p>GRUB1 queried User table in Cloudflare’s Salesforce tenant: <code>“SELECT Id, Username, Email, FirstName, LastName, Name, Title, CompanyName, Department, Division, Phone, MobilePhone, IsActive, LastLoginDate, CreatedDate, LastModifiedDate, TimeZoneSidKey, LocaleSidKey, LanguageLocaleKey, EmailEncodingKey FROM User WHERE IsActive = :x ORDER BY LastLoginDate DESC NULLS LAST LIMIT 20”</code></p></td></tr><tr><td><p><b>2025-08-14 11:09:22</b></p></td><td><p>GRUB1 sent a <code>GET</code> request on LimitSnapshot in Cloudflare’s Salesforce tenant: <code>/services/data/v58.0/limits/</code></p></td></tr><tr><td><p><b>2025-08-16 19:26:37</b></p></td><td><p>GRUB1 logged into Cloudflare’s Salesforce tenant from  <code>44[.]215[.]108[.]109</code></p></td></tr><tr><td><p><b>2025-08-16 19:28:08</b></p></td><td><p>GRUB1 queried Cases table in Cloudflare’s Salesforce tenant: <code>SELECT COUNT() FROM</code> Case</p></td></tr><tr><td><p><b>2025-08-17 11:11:23</b></p></td><td><p>GRUB1 logged into Cloudflare’s Salesforce tenant from <code>208[.]68[.]36[.]90</code></p></td></tr><tr><td><p><b>2025-08-17 11:11:55</b></p></td><td><p>GRUB1 queried Case table in Cloudflare’s Salesforce tenant: <code>SELECT COUNT() FROM </code>Case</p></td></tr><tr><td><p><b>2025-08-17 11:11:56 to 11:15:18</b></p></td><td><p>GRUB1 leveraged Salesforce BulkAPI 2.0 from <code>208[.]68[.]36[.]90</code> to <b>execute</b> a job to exfiltrate the Cases object </p></td></tr><tr><td><p><b>2025-08-17 11:15:42</b></p></td><td><p>GRUB1 leveraged Salesforce Bulk API 2.0 from <code>208[.]68[.]36[.]90</code> to<b> delete </b>the recently executed job used to exfiltrate the <i>C</i>ases object</p></td></tr></table><p></p> ]]></content:encoded>
            <category><![CDATA[Post Mortem]]></category>
            <guid isPermaLink="false">4769G2MCNVfvZe8a8Rr8bv</guid>
            <dc:creator>Sourov Zaman</dc:creator>
            <dc:creator>Craig Strubhart</dc:creator>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Welcome to Security Week 2025]]></title>
            <link>https://blog.cloudflare.com/welcome-to-security-week-2025/</link>
            <pubDate>Sun, 16 Mar 2025 18:00:00 GMT</pubDate>
            <description><![CDATA[ Over the next week, we will discuss the latest trends in cyber security, announce new products and partnerships, and showcase the latest in Cloudflare technology. Welcome to Security Week 2025! ]]></description>
            <content:encoded><![CDATA[ <p>The layer of security around today’s Internet is essential to safeguarding everything. From the way we shop online, engage with our communities, access critical healthcare resources, sustain the worldwide digital economy, and beyond. Our dependence on the Internet has led to cyber attacks that are bigger and more widespread than ever, worsening the so-called defender’s dilemma: attackers only need to succeed once, while defenders must succeed every time.</p><p>In the past year alone, we <a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/"><u>discovered and mitigated the largest DDoS attack</u></a> ever recorded in the history of the Internet – three different times – underscoring the rapid and persistent efforts of threat actors. We helped <a href="https://blog.cloudflare.com/elections-2024-internet/"><u>safeguard the largest year of elections</u></a> across the globe, with more than half the world’s population eligible to vote, all while witnessing geopolitical tensions and war reflected in the digital world.</p><p>2025 already promises to follow suit, with cyberattacks estimated to cost the global economy $10.5 trillion in 2025. As the rapid advancement of <a href="https://x.com/i/grok?text=AI%20advancements">AI</a> and emerging technologies increases, and as threat actors become more agile and creative, the security landscape continues to drastically evolve. Organizations now face a higher volume of attacks, and an influx of more complex threats that carry real-world consequences, such as state-sponsored cyber attacks and assaults on critical infrastructure. </p><p>My job is to protect Cloudflare as an organization and support our customers in staying one step ahead of threat actors. While every week is a security week at Cloudflare, it’s time to ship — that’s what Innovation Weeks are all about! Welcome to Security Week 2025.</p>
    <div>
      <h2>My perspective on the security landscape</h2>
      <a href="#my-perspective-on-the-security-landscape">
        
      </a>
    </div>
    <p>As CSO, I have the privilege of collaborating with world-class security leaders who are navigating the dynamic threat and regulatory landscape. Through meaningful exchanges at forums like the World Economic Forum at Davos, RSA, and Black Hat, I've gained useful perspectives on the shared difficulties we encounter while handling today’s security needs:</p><ul><li><p><b>Complexity: </b>Complexity has become the enemy of security. Teams are struggling with fragmented technology stacks, multi-cloud environments and continued gaps in security talent. Situational awareness is limited, disparate systems increase operational overhead, and the ability to modernize becomes daunting.</p></li><li><p><b>Artificial Intelligence: </b>AI presents both opportunity and risk. Organizations are racing to leverage AI faster than they can train their workforce on how to mitigate the unique risks it introduces. Security teams are being asked to <a href="https://www.cloudflare.com/ai-security/">secure AI models to protect sensitive data and support operational stability</a>, all on constrained budgets and resources.</p></li><li><p><b>Security blind spots: </b>The attack surface continues to expand. With remote work, cloud migration, and the acceleration of digital transformation, security teams struggle to maintain visibility across increasingly distributed environments. This expansion has created blind spots that sophisticated threat actors are quick to exploit.</p></li><li><p><b>Trusted vendors: </b>Supply chain security incidents increase year over year. Recent high-profile incidents have demonstrated how vulnerabilities in third-party components can cascade through the digital ecosystem. Security teams must account for risks far beyond their immediate perimeter, extending to every dependency in their technology stack.</p></li><li><p><b>Detection velocity: </b>The time it takes to detect a threat actor in your environment remains too long. Despite investments in monitoring and detection technologies, the average dwell time for attackers still exceeds industry targets. Security leaders express frustration that sophisticated adversaries can operate undetected within networks for extended periods of time.</p></li></ul><p>What's clear across the security community is that the traditional approach of layering point solutions is not sustainable. Security leaders need integrated platforms that reduce complexity while providing comprehensive protection and visibility. This is precisely <a href="https://blog.cloudflare.com/why-i-joined-cloudflare-as-chief-security-officer/"><u>why I joined Cloudflare nearly two years ago</u></a> — to help build innovative solutions for today’s threat landscape and the future, not the threat landscape from five years ago.</p>
    <div>
      <h2>Security Week priorities in 2025</h2>
      <a href="#security-week-priorities-in-2025">
        
      </a>
    </div>
    <p>Over the following week we will showcase innovation that will help security practitioners solve the challenges faced every day. As leader of the security organization at Cloudflare, and Customer Zero, our team has influenced the product updates launching this week.</p><p>Here is a preview of what you can expect this week:</p>
    <div>
      <h3>Securing the post-quantum world</h3>
      <a href="#securing-the-post-quantum-world">
        
      </a>
    </div>
    <p>Quantum computing will change the face of Internet security forever — particularly in the realm of cryptography, which is the way communications and information are secured across channels like the Internet.</p><p>As quantum computing continues to mature, research and development efforts in cryptography are keeping pace. We’re optimistic that collaborative efforts among NIST, Microsoft, Cloudflare, and other computing companies will yield a robust, standards-based solution. </p><p>Cloudflare will announce advancements to its cloud-native <a href="https://blog.cloudflare.com/tag/post-quantum/"><u>quantum-safe</u></a> zero trust solution, the first of its kind. This ensures future-proof security for corporate network traffic in an easily adoptable way for our customers. The updates shared by our product team will redefine how businesses and individuals navigate our evolving post-quantum landscape.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VEhsmtQf722vc2NJTVRco/cf5127478d25ca87d38b2bbb501f86db/unnamed.png" />
          </figure>
    <div>
      <h3>Contextualizing threats on the network that blocks the most attacks </h3>
      <a href="#contextualizing-threats-on-the-network-that-blocks-the-most-attacks">
        
      </a>
    </div>
    <p>Effective security programs need to stay two steps ahead of emerging threats. Threat intelligence available to most security teams comes without context, making it challenging to react accordingly. </p><p>This week, we’re launching our threat events platform, providing our customers real-time cyber threat intelligence data. By leveraging our network footprint, customers will have a comprehensive view of cyber threats based on attacks occurring across the Internet. </p><p>This product will enable users to self-serve with contextual insights into attacks occurring on the Internet, enhancing their ability to proactively adjust defenses and respond to emerging threats. As security practitioners, stopping threats at the gate isn’t enough — we need to be ahead of the next vector. The Threat Events feed provides that additional layer of forensic analysis to give us that edge — dissecting the who, how, and why behind each attack. It’s like performing an autopsy on the threats we neutralize, revealing patterns, tactics, and potential weaknesses in our defenses that raw data alone might miss.</p>
    <div>
      <h3>Stopping threats at the edge with AI</h3>
      <a href="#stopping-threats-at-the-edge-with-ai">
        
      </a>
    </div>
    <p>No surprise, AI is still the number one topic of discussion. AI is a common theme across all industries, with a core concern of how to secure and protect our investments. As a leader in providing infrastructure for AI training and inference, our engineering and product teams have been working hard on building a way to protect our own, and our customers', AI models, data, and applications.</p><p>This week, our product team will share how our users can gain greater control over their data with our new Firewall for AI and improved capabilities for our related AI Gateway. As the world shifts its focus from building models to actively deploying them, you need to <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">protect against third parties exploiting your data</a> to train their own generative AI systems. </p><p>Alongside this, we’ll provide security teams with visibility and protection across all web and enterprise applications from a single, unified platform. This new capability can pinpoint the location of all applications across your organization, understand corresponding potential threats, and provide risk reduction recommendations.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jgsJYcCabhPRnJjrdVElQ/27574287408a505782afa32a027731d5/unnamed__1_.png" />
          </figure>
    <div>
      <h3>How can we help make the Internet better</h3>
      <a href="#how-can-we-help-make-the-internet-better">
        
      </a>
    </div>
    <p>Beyond new tools and features, Security Week 2025 represents our commitment to our mission of helping build a better Internet.</p><p>What sets Cloudflare apart is our unique position at the intersection of security and innovation. The solutions we're unveiling this week aren't just responses to today's threats, they're forward-looking innovations that anticipate tomorrow's challenges. They reflect our understanding that security must evolve from being reactive to predictive, from complex to intuitive, and from siloed to integrated.</p>
    <div>
      <h2>Welcome to Security Week</h2>
      <a href="#welcome-to-security-week">
        
      </a>
    </div>
    <p>Innovation Weeks have become a cornerstone of how we connect with our community at Cloudflare. For me personally, each Security Week brings renewed energy and perspective. The conversations with customers, security practitioners, and industry leaders continuously reshapes our understanding of what's possible.</p><p>I invite you to engage with us throughout the week, whether through live demos, technical deep dives, or direct conversations with our team. My hope is that you'll walk away not just with new tools, but with a clearer vision of how we can collectively build a safer Internet experience for everyone.</p><p>The future of security isn't about building higher walls, it's about creating smarter ecosystems. Let's build that future together.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZgAsuDrtmGZeGvmFaigWT/6c1fe42eee2fac7320b8562d71269abc/unnamed__2_.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">60jUb6Vj3kgqQdiJp4P3FX</guid>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Welcome to Security Week 2024]]></title>
            <link>https://blog.cloudflare.com/welcome-to-security-week-2024/</link>
            <pubDate>Sun, 03 Mar 2024 18:00:07 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Chief Security Officer introduces 2024 Security Week by sharing insights into the past year of threats, security incidents and key priorities and concerns for global CISOs ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IwpCETFd8uaDhI7XgP0Rg/c970b95e1ad38f7cb8fd85a0b05ed307/image4-1.png" />
            
            </figure><p>April 2024 will mark my one-year anniversary as the Chief Security Officer at Cloudflare. In the past year, we’ve seen a rapid increase in sophisticated threats and incidents globally. Boards and executives are applying significant pressure to security organizations to prevent security breaches while maintaining only slight increases to budgets. Adding regulatory scrutiny, global security leaders are under pressure to deliver on the expectations from executives to protect their company. While this has been the expectation for over 20 years, we have recently seen a significant rise in attacks, including the largest and most sophisticated <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack">DDoS attacks</a>, and the continued supply chain incidents from Solarwinds to Okta. Along with more nation state sponsored attackers, it is clear security professionals – including Cloudflare – can’t let their guards down and become complacent when it comes to security.</p><p>This past year, I met with over a hundred customers at events like our Cloudflare Connect conference in London, Chicago, Sydney, and NYC. I spoke with executives, policy experts, and world leaders at Davos. And I've been in constant dialogue with security peers across tech and beyond. There is much consistency amongst all security leaders on the pain points and concerns of Chief Information Security Officers (CISOs), spanning every geography and industry, from startups to large Fortune 500s.</p><p>Over the course of this week we will announce new products inspired by these conversations that respond to <a href="https://www.cloudflare.com/ciso/">common challenges faced by CISOs</a> around the world. We will cover many aspects of these security concerns, ranging from application security to securing employees and cloud infrastructure. We will also be sharing stories of how we do things at Cloudflare, and some thought leadership blog posts.</p>
    <div>
      <h2>My Cloudflare Journey</h2>
      <a href="#my-cloudflare-journey">
        
      </a>
    </div>
    <p>As a CSO for more than 20 years for some of the world’s largest and most complex companies, I was drawn to the rapid innovation, unique market position and the global network that Cloudflare offers. Looking back on my first year at Cloudflare, the discussions I have had with customers has shaped me into a better CSO. Sharing my own challenges and listening to others has expanded my own understanding of the complex issues that we, Cloudflare, can learn from and adopt.</p><p>The core pillars of my organization are to Protect Cloudflare, Foster Innovation, and share “How Cloudflare does it.”  My team is customer zero: first to use Cloudflare products and collaborate on needs of security organizations. Innovation weeks are certainly a key feature of the Cloudflare way, and I’m extremely proud to be able to open Security Week 2024 by announcing a series of exciting new products and features.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/zR3gGS0YDRLfAicWOdvMO/d225e9a2e0208288ad6d3ce5399659cf/image1.png" />
            
            </figure>
    <div>
      <h2>Security Priorities in 2024</h2>
      <a href="#security-priorities-in-2024">
        
      </a>
    </div>
    <p>There are three key challenges that have emerged in my discussions with CISOs and security practitioners: responding to risks and opportunities from AI, maintaining visibility and control as cloud technology changes so quickly, and how to consolidate technologies to effectively manage the security and IT budget.</p><p>One of the key topics I heard at Davos is how global leaders can address urgent global issues. As a society, we are facing a number of challenges, ranging from the environment to the ongoing effort to keep democracies functioning. The role of the Internet has never been more crucial, and I believe it’s a shared responsibility to keep it functioning and improve its security.</p><p>Our product and engineering teams have been working to deliver an array of solutions aligned to these challenges, and ultimately helping build a better Internet.</p>
    <div>
      <h3>Responding to opportunity and risk from AI</h3>
      <a href="#responding-to-opportunity-and-risk-from-ai">
        
      </a>
    </div>
    <p>No surprise, AI is the number one topic of discussion. At Davos, AI was the common theme across all industries, with a core concern of how to secure and protect our investments. As a leader in AI inference, our engineering and product teams have been working hard on building a way to protect our own, and our customers', AI models and applications.</p><p>This week our product teams are announcing tools to safeguard applications in the era of AI as well as AI-powered features helping our customers simplify how they interact with our analytics.</p><p>As a CSO, securing data is a core capability that is only made more challenging as the workforce may choose to use open AI services without understanding the risks. We have some announcements this week aligned with preventing data leakage from AI, as well as how you can use AI to secure against AI-enhanced phishing.</p><p>Finally, we will also share our philosophy of how AI can be used to increase the level of defense and security against increasingly sophisticated attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Sj9EFb3gZBvnqz4eCPakw/6bc1f3d7460586cb3f39351c0da45a43/image2.png" />
            
            </figure>
    <div>
      <h3>Maintaining visibility and control as applications and clouds change</h3>
      <a href="#maintaining-visibility-and-control-as-applications-and-clouds-change">
        
      </a>
    </div>
    <p>Effective security programs keenly focus on reducing complexity, increasing visibility, and robust alerting capabilities. A resounding message of 2024 is security by design, rather than bolted-on security. Security by design sounds easy but is more challenging for those of us without a greenfield.</p><p>While most do not have the luxury of starting over, many are succeeding by eliminating legacy tooling, such as third party storage tools, and at the same time gaining visibility and control.</p><p>There are new ways to secure and connect multi-cloud environments with consistent policy management. Our team will be sharing many new releases they are working on, and a recent acquisition, all aligned to this challenge we all face.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FcpQm1xn9LKR94CITnfXT/106a655c116430a80ddd7e5e1dfadaaf/image3.png" />
            
            </figure>
    <div>
      <h3>Consolidating to drive down costs</h3>
      <a href="#consolidating-to-drive-down-costs">
        
      </a>
    </div>
    <p>Every year security leaders are asked to do more with less.  With economic uncertainty persisting into 2024, budget constraints have each of us critically analyzing our security stack for value and simplicity. Everyone is looking for strategies that not only reduce costs, but reduce complexity and <a href="https://www.cloudflare.com/cybersecurity-risk-management/">increase your posture</a> by removing room for human error. The CISOs who I see succeed in this environment have built programs based on simplification. Cloud migrations and zero trust architecture implementations have many asking if those transformations delivered on the promise of simplification and scale. My own zero trust journeys have given me a deep appreciation for the Cloudflare approach in moving away from expensive and complex security architectures.</p>
    <div>
      <h3>How can we help make the Internet better?</h3>
      <a href="#how-can-we-help-make-the-internet-better">
        
      </a>
    </div>
    <p>2024 will be a pivotal year for the Internet. Geopolitical conflict and the elections around the world are being heavily analyzed for impact across every industry.  This week we will share how we can leverage our robust platforms to stand by our mission to help build a better Internet and protect global democracy and large scale international events.</p>
    <div>
      <h2>Welcome to Security Week</h2>
      <a href="#welcome-to-security-week">
        
      </a>
    </div>
    <p>Innovation weeks are a great tradition at Cloudflare. This is where we launch new capabilities and share new ways to solve the challenges we have heard from our customers. No surprise, <a href="https://www.cloudflare.com/security-week/">Security Week</a> will be my personal favorite. I hope you each walk away with something that makes your job just a little easier.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <guid isPermaLink="false">6Ed3xVFZr0wa1Jmnkxjwvl</guid>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Thanksgiving 2023 security incident]]></title>
            <link>https://blog.cloudflare.com/thanksgiving-2023-security-incident/</link>
            <pubDate>Thu, 01 Feb 2024 20:00:24 GMT</pubDate>
            <description><![CDATA[ On Thanksgiving Day, November 23, 2023, Cloudflare detected a threat actor on our self-hosted Atlassian server. Our security team immediately began an investigation, cut off the threat actor’s access, and no Cloudflare customer data or systems were impacted by this event ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Thanksgiving Day, November 23, 2023, Cloudflare detected a threat actor on our self-hosted Atlassian server. Our security team immediately began an investigation, cut off the threat actor’s access, and on Sunday, November 26, we brought in CrowdStrike’s Forensic team to perform their own independent analysis.</p><p>Yesterday, CrowdStrike completed its investigation, and we are publishing this blog post to talk about the details of this security incident.</p><p>We want to emphasize to our customers that no Cloudflare customer data or systems were impacted by this event. Because of our access controls, firewall rules, and use of hard security keys enforced using our own Zero Trust tools, the threat actor’s ability to move laterally was limited. No services were implicated, and no changes were made to our global network systems or configuration. This is the promise of a Zero Trust architecture: it’s like bulkheads in a ship where a compromise in one system is limited from compromising the whole organization.</p><p>From November 14 to 17, a threat actor did reconnaissance and then accessed our internal wiki (which uses Atlassian Confluence) and our bug database (Atlassian Jira). On November 20 and 21, we saw additional access indicating they may have come back to test access to ensure they had connectivity.</p><p>They then returned on November 22 and established persistent access to our Atlassian server using ScriptRunner for Jira, gained access to our source code management system (which uses Atlassian Bitbucket), and tried, unsuccessfully, to access a console server that had access to the data center that Cloudflare had not yet put into production in São Paulo, Brazil.</p><p>They did this by using one access token and three service account credentials that had been taken, and that we failed to rotate, after the <a href="/how-cloudflare-mitigated-yet-another-okta-compromise">Okta compromise of October 2023</a>. All threat actor access and connections were terminated on November 24 and CrowdStrike has confirmed that the last evidence of threat activity was on November 24 at 10:44.</p><p><i>(Throughout this blog post all dates and times are UTC.)</i></p><p>Even though we understand the operational impact of the incident to be extremely limited, we took this incident very seriously because a threat actor had used stolen credentials to get access to our Atlassian server and accessed some documentation and a limited amount of source code. Based on our collaboration with colleagues in the industry and government, we believe that this attack was performed by a nation state attacker with the goal of obtaining persistent and widespread access to Cloudflare’s global network.</p>
    <div>
      <h3>“Code Red” Remediation and Hardening Effort</h3>
      <a href="#code-red-remediation-and-hardening-effort">
        
      </a>
    </div>
    <p>On November 24, after the threat actor was removed from our environment, our security team pulled in all the people they needed across the company to investigate the intrusion and ensure that the threat actor had been completely denied access to our systems, and to ensure we understood the full extent of what they accessed or tried to access.</p><p>Then, from November 27, we redirected the efforts of a large part of the Cloudflare technical staff (inside and outside the security team) to work on a single project dubbed “Code Red”. The focus was strengthening, validating, and remediating any control in our environment to ensure we are secure against future intrusion and to validate that the threat actor could not gain access to our environment. Additionally, we continued to investigate every system, account and log to make sure the threat actor did not have persistent access and that we fully understood what systems they had touched and which they had attempted to access.</p><p>CrowdStrike performed an independent assessment of the scope and extent of the threat actor’s activity, including a search for any evidence that they still persisted in our systems. CrowdStrike’s investigation provided helpful corroboration and support for our investigation, but did not bring to light any activities that we had missed. This blog post outlines in detail everything we and CrowdStrike uncovered about the activity of the threat actor.</p><p>The only production systems the threat actor could access using the stolen credentials was our Atlassian environment. Analyzing the wiki pages they accessed, bug database issues, and source code repositories, it appears they were looking for information about the architecture, security, and management of our global network; no doubt with an eye on gaining a deeper foothold. Because of that, we decided a huge effort was needed to further harden our security protocols to prevent the threat actor from being able to get that foothold had we overlooked something from our log files.</p><p>Our aim was to prevent the attacker from using the technical information about the operations of our network as a way to get back in. Even though we believed, and later confirmed, the attacker had limited access, we undertook a comprehensive effort to rotate every production credential (more than 5,000 individual credentials), physically segment test and staging systems, performed forensic triages on 4,893 systems, reimaged and rebooted every machine in our global network including all the systems the threat actor accessed and all Atlassian products (Jira, Confluence, and Bitbucket).</p><p>The threat actor also attempted to access a console server in our new, and not yet in production, data center in São Paulo. All attempts to gain access were unsuccessful. To ensure these systems are 100% secure, equipment in the Brazil data center was returned to the manufacturers. The manufacturers’ forensic teams examined all of our systems to ensure that no access or persistence was gained. Nothing was found, but we replaced the hardware anyway.</p><p>We also looked for software packages that hadn’t been updated, user accounts that might have been created, and unused active employee accounts; we went searching for secrets that might have been left in Jira tickets or source code, examined and deleted all HAR files uploaded to the wiki in case they contained tokens of any sort. Whenever in doubt, we assumed the worst and made changes to ensure anything the threat actor was able to access would no longer be in use and therefore no longer be valuable to them.</p><p>Every member of the team was encouraged to point out areas the threat actor might have touched, so we could examine log files and determine the extent of the threat actor’s access. By including such a large number of people across the company, we aimed to leave no stone unturned looking for evidence of access or changes that needed to be made to improve security.</p><p>The immediate “Code Red” effort ended on January 5, but work continues across the company around credential management, software hardening, vulnerability management, additional alerting, and more.</p>
    <div>
      <h3>Attack timeline</h3>
      <a href="#attack-timeline">
        
      </a>
    </div>
    <p>The attack started in October with the compromise of Okta, but the threat actor only began targeting our systems using those credentials from the Okta compromise in mid-November.</p><p>The following timeline shows the major events:</p>
    <div>
      <h3>October 18 - Okta compromise</h3>
      <a href="#october-18-okta-compromise">
        
      </a>
    </div>
    <p>We’ve <a href="/how-cloudflare-mitigated-yet-another-okta-compromise">written about this before</a> but, in summary, we were (for the second time) the victim of a compromise of Okta’s systems which resulted in a threat actor gaining access to a set of credentials. These credentials were meant to all be rotated.</p><p>Unfortunately, we failed to rotate one service token and three service accounts (out of thousands) of credentials that were leaked during the Okta compromise.</p><p>One was a Moveworks service token that granted remote access into our Atlassian system. The second credential was a service account used by the SaaS-based Smartsheet application that had administrative access to our Atlassian Jira instance, the third account was a Bitbucket service account which was used to access our source code management system, and the fourth was an AWS environment that had no access to the global network and no customer or sensitive data.</p><p>The one service token and three accounts were not rotated because mistakenly it was believed they were unused. This was incorrect and was how the threat actor first got into our systems and gained persistence to our Atlassian products. Note that this was in no way an error on the part of Atlassian, AWS, Moveworks or Smartsheet. These were merely credentials which we failed to rotate.</p>
    <div>
      <h3>November 14 09:22:49 - threat actor starts probing</h3>
      <a href="#november-14-09-22-49-threat-actor-starts-probing">
        
      </a>
    </div>
    <p>Our logs show that the threat actor started probing and performing reconnaissance of our systems beginning on November 14, looking for a way to use the credentials and what systems were accessible. They attempted to log into our Okta instance and were denied access. They attempted access to the Cloudflare Dashboard and were denied access.</p><p>Additionally, the threat actor accessed an AWS environment that is used to power the Cloudflare Apps marketplace. This environment was segmented with no access to global network or customer data. The service account to access this environment was revoked, and we validated the integrity of the environment.</p>
    <div>
      <h3>November 15 16:28:38 - threat actor gains access to Atlassian services</h3>
      <a href="#november-15-16-28-38-threat-actor-gains-access-to-atlassian-services">
        
      </a>
    </div>
    <p>The threat actor successfully accessed Atlassian Jira and Confluence on November 15 using the Moveworks service token to authenticate through our gateway, and then they used the Smartsheet service account to gain access to the Atlassian suite. The next day they began looking for information about the configuration and management of our global network, and accessed various Jira tickets.</p><p>The threat actor searched the wiki for things like remote access, secret, client-secret, openconnect, cloudflared, and token. They accessed 36 Jira tickets (out of a total of 2,059,357 tickets) and 202 wiki pages (out of a total of 194,100 pages).</p><p>The threat actor accessed Jira tickets about vulnerability management, secret rotation, MFA bypass, network access, and even our response to the Okta incident itself.</p><p>The wiki searches and pages accessed suggest the threat actor was very interested in all aspects of access to our systems: password resets, remote access, configuration, our use of Salt, but they did not target customer data or customer configurations.</p>
    <div>
      <h3>November 16 14:36:37 - threat actor creates an Atlassian user account</h3>
      <a href="#november-16-14-36-37-threat-actor-creates-an-atlassian-user-account">
        
      </a>
    </div>
    <p>The threat actor used the Smartsheet credential to create an Atlassian account that looked like a normal Cloudflare user. They added this user to a number of groups within Atlassian so that they’d have persistent access to the Atlassian environment should the Smartsheet service account be removed.</p>
    <div>
      <h3>November 17 14:33:52 to November 20 09:26:53 - threat actor takes a break from accessing Cloudflare systems</h3>
      <a href="#november-17-14-33-52-to-november-20-09-26-53-threat-actor-takes-a-break-from-accessing-cloudflare-systems">
        
      </a>
    </div>
    <p>During this period, the attacker took a break from accessing our systems (apart from apparently briefly testing that they still had access) and returned just before Thanksgiving.</p>
    <div>
      <h3>November 22 14:18:22 - threat actor gains persistence</h3>
      <a href="#november-22-14-18-22-threat-actor-gains-persistence">
        
      </a>
    </div>
    <p>Since the Smartsheet service account had administrative access to Atlassian Jira, the threat actor was able to install the Sliver Adversary Emulation Framework, which is a widely used tool and framework that red teams and attackers use to enable “C2” (command and control), connectivity gaining persistent and stealthy access to a computer on which it is installed. Sliver was installed using the ScriptRunner for Jira plugin.</p><p>This allowed them continuous access to the Atlassian server, and they used this to attempt lateral movement. With this access the Threat Actor attempted to gain access to a non-production console server in our São Paulo, Brazil data center due to a non-enforced ACL. The access was denied, and they were not able to access any of the global network.</p><p>Over the next day, the threat actor viewed 120 code repositories (out of a total of 11,904 repositories). Of the 120, the threat actor used the Atlassian Bitbucket git archive feature on 76 repositories to download them to the Atlassian server, and even though we were not able to confirm whether or not they had been exfiltrated, we decided to treat them as having been exfiltrated.</p><p>The 76 source code repositories were almost all related to how backups work, how the global network is configured and managed, how identity works at Cloudflare, remote access, and our use of Terraform and Kubernetes. A small number of the repositories contained encrypted secrets which were rotated immediately even though they were strongly encrypted themselves.</p><p>We focused particularly on these 76 source code repositories to look for embedded secrets, (secrets stored in the code were rotated), vulnerabilities and ways in which an attacker could use them to mount a subsequent attack. This work was done as a priority by engineering teams across the company as part of “Code Red”.</p><p>As a SaaS company, we’ve long believed that our source code itself is not as precious as the source code of software companies that distribute software to end users. In fact, we’ve open sourced a large amount of our source code and speak openly through our blog about algorithms and techniques we use. So our focus was not on someone having access to the source code, but whether that source code contained embedded secrets (such as a key or token) and vulnerabilities.</p>
    <div>
      <h3>November 23 - Discovery and threat actor access termination begins</h3>
      <a href="#november-23-discovery-and-threat-actor-access-termination-begins">
        
      </a>
    </div>
    <p>Our security team was alerted to the threat actor’s presence at 16:00 and deactivated the Smartsheet service account 35 minutes later. 48 minutes later the user account created by the threat actor was found and deactivated. Here’s the detailed timeline for the major actions taken to block the threat actor once the first alert was raised.</p><p>15:58 - The threat actor adds the Smartsheet service account to an administrator group.16:00 - Automated alert about the change at 15:58 to our security team.16:12 - Cloudflare SOC starts investigating the alert.16:35 - Smartsheet service account deactivated by Cloudflare SOC.17:23 - The threat actor-created Atlassian user account is found and deactivated.17:43 - Internal Cloudflare incident declared.21:31 - Firewall rules put in place to block the threat actor’s known IP addresses.</p>
    <div>
      <h3>November 24 - Sliver removed; all threat actor access terminated</h3>
      <a href="#november-24-sliver-removed-all-threat-actor-access-terminated">
        
      </a>
    </div>
    <p>10:44 - Last known threat actor activity.11:59 - Sliver removed.</p><p>Throughout this timeline, the threat actor tried to access a myriad of other systems at Cloudflare but failed because of our access controls, firewall rules, and use of hard security keys enforced using our own Zero Trust tools.</p><p>To be clear, we saw no evidence whatsoever that the threat actor got access to our global network, data centers, SSL keys, customer databases or configuration information, Cloudflare Workers deployed by us or customers, AI models, network infrastructure, or any of our datastores like Workers KV, R2 or Quicksilver. Their access was limited to the Atlassian suite and the server on which our Atlassian runs.</p><p>A large part of our “Code Red” effort was understanding what the threat actor got access to and what they tried to access. By looking at logging across systems we were able to track attempted access to our internal metrics, network configuration, build system, alerting systems, and release management system. Based on our review, none of their attempts to access these systems were successful. Independently, CrowdStrike performed an assessment of the scope and extent of the threat actor’s activity, which did not bring to light activities that we had missed and concluded that the last evidence of threat activity was on November 24 at 10:44.</p><p>We are confident that between our investigation and CrowdStrike’s, we fully understand the threat actor’s actions and that they were limited to the systems on which we saw their activity.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>This was a security incident involving a sophisticated actor, likely a nation-state, who operated in a thoughtful and methodical manner. The efforts we have taken ensure that the ongoing impact of the incident was limited and that we are well-prepared to fend off any sophisticated attacks in the future. This required the efforts of a significant number of Cloudflare’s engineering staff, and, for over a month, this was the highest priority at Cloudflare. The entire Cloudflare team worked to ensure that our systems were secure, the threat actor’s access was understood, to remediate immediate priorities (such as mass credential rotation), and to build a plan of long-running work to improve our overall security based on areas for improvement discovered during this process.</p><p>We are incredibly grateful to everyone at Cloudflare who responded quickly over the Thanksgiving holiday to conduct an initial analysis and lock out the threat actor, and all those who contributed to this effort. It would be impossible to name everyone involved, but their long hours and dedicated work made it possible to undertake an essential review and change of Cloudflare’s security while keeping our global network running and our customers’ service running.</p><p>We are grateful to CrowdStrike for having been available immediately to conduct an independent assessment. Now that their final report is complete, we are confident in our internal analysis and remediation of the intrusion and are making this blog post available.</p><p><b>IOCs</b>Below are the Indications of Compromise (IOCs) that we saw from this threat actor. We are publishing them so that other organizations, and especially those that may have been impacted by the Okta breach, can search their logs to confirm the same threat actor did not access their systems.</p>
<table>
<thead>
  <tr>
    <th><span>Indicator</span></th>
    <th><span>Indicator Type</span></th>
    <th><span>SHA256</span></th>
    <th><span>Description</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>193.142.58[.]126 </span></td>
    <td><span>IPv4</span></td>
    <td><span>N/A</span></td>
    <td><span>Primary threat actor</span><br /><span>Infrastructure, owned by</span><br /><span>M247 Europe SRL (Bucharest,</span><br /><span>Romania)</span></td>
  </tr>
  <tr>
    <td><span>198.244.174[.]214 </span></td>
    <td><span>IPv4</span></td>
    <td><span>N/A</span></td>
    <td><span>Sliver C2 server, owned by</span><br /><span>OVH SAS (London, England)</span></td>
  </tr>
  <tr>
    <td><span>idowall[.]com</span></td>
    <td><span>Domain</span></td>
    <td><span>N/A</span></td>
    <td><span>Infrastructure serving Sliver</span><br /><span>payload</span></td>
  </tr>
  <tr>
    <td><span>jvm-agent</span></td>
    <td><span>Filename</span></td>
    <td><span>bdd1a085d651082ad567b03e5186d1d4<br />6d822bb7794157ab8cce95d850a3caaf</span></td>
    <td><span>Sliver payload</span></td>
  </tr>
</tbody>
</table><p></p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4iLxjDabtXj9DBA7dv3Wig</guid>
            <dc:creator>Matthew Prince</dc:creator>
            <dc:creator>John Graham-Cumming</dc:creator>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare mitigated yet another Okta compromise]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/</link>
            <pubDate>Fri, 20 Oct 2023 21:39:13 GMT</pubDate>
            <description><![CDATA[ On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta. We have verified that no Cloudflare customer information or systems were impacted by this event because of our rapid response.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta – threat actors were able to leverage an authentication token compromised at Okta to pivot into Cloudflare’s Okta instance. While this was a troubling security incident, our Security Incident Response Team’s (SIRT) real-time detection and prompt response enabled containment and minimized the impact to Cloudflare systems and data. We have verified that <b>no Cloudflare customer information or systems were impacted by this event</b> because of our rapid response. Okta has now released a <a href="https://sec.okta.com/harfiles">public statement</a> about this incident.</p><p>This is the second time Cloudflare has been impacted by a breach of Okta’s systems. In <a href="/cloudflare-investigation-of-the-january-2022-okta-compromise/">March 2022</a>, we blogged about our investigation on how a breach of Okta affected Cloudflare. In that incident, we concluded that there was no access from the threat actor to any of our systems or data – Cloudflare’s use of hard keys for multi-factor authentication stopped this attack.  </p><p>The key to mitigating this week’s incident was our team’s early detection and immediate response. In fact, we contacted Okta about the breach of their systems before they had notified us. The attacker used an open session from Okta, with Administrative privileges, and accessed our Okta instance. We were able to use our Cloudflare Zero Trust Access, Gateway, and Data Loss Prevention and our Cloudforce One threat research to validate the scope of the incident and contain it before the attacker could gain access to customer data, customer systems, or our production network. With this confidence, we were able to quickly mitigate the incident before the threat-actors were able to establish persistence.</p><p>According to Okta’s statement, the threat-actor accessed Okta’s customer support system and viewed files uploaded by certain Okta customers as part of recent support cases. It appears that in our case, the threat-actor was able to hijack a session token from a support ticket which was created by a Cloudflare employee. Using the token extracted from Okta, the threat-actor accessed Cloudflare systems on October 18. In this sophisticated attack, we observed that threat-actors compromised two separate Cloudflare employee accounts within the Okta platform. We detected this activity internally more than 24 hours before we were notified of the breach by Okta. Upon detection, our SIRT was able to engage quickly to identify the complete scope of compromise and contain the security incident. Cloudflare’s <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust architecture</a> protects our production environment, which helped prevent any impact to our customers.</p>
    <div>
      <h2>Recommendations for Okta</h2>
      <a href="#recommendations-for-okta">
        
      </a>
    </div>
    <p>We urge Okta to consider implementing the following best practices, including:</p><ul><li><p>Take any report of compromise seriously and act immediately to limit damage; in this case Okta was first notified on October 2, 2023 by <a href="https://www.beyondtrust.com/blog/entry/okta-support-unit-breach">BeyondTrust</a> but the attacker still had access to their support systems at least until October 18, 2023.</p></li><li><p>Provide timely, responsible disclosures to your customers when you identify that a breach of your systems has affected them.</p></li><li><p>Require hardware keys to protect all systems, including third-party support providers.</p></li></ul><p>For a critical security service provider like Okta, we believe following these best practices is table stakes.</p>
    <div>
      <h2>Recommendations for Okta’s Customers</h2>
      <a href="#recommendations-for-oktas-customers">
        
      </a>
    </div>
    <p>If you are an Okta customer, we recommend that you reach out to them for further information regarding potential impact to your organization. We also advise the following actions:</p><ul><li><p>Enable Hardware MFA for all user accounts. Passwords alone do not offer the necessary level of protection against attacks. We strongly recommend the usage of hardware keys, as other methods of MFA can be vulnerable to phishing attacks.</p></li><li><p>Investigate and respond to:</p><ul><li><p>All unexpected password and MFA changes for your Okta instances.</p></li><li><p>Suspicious support-initiated events.</p></li><li><p>Ensure all password resets are valid and force a password reset for any under suspicion.</p></li><li><p>Any suspicious MFA-related events, ensuring only valid MFA keys are present in the user's account configuration.</p></li></ul></li><li><p>Monitor for:</p><ul><li><p>New Okta users created.</p></li><li><p>Reactivation of Okta users.</p></li><li><p>All sessions have proper authentication associated with it.</p></li><li><p>All Okta account and permission changes.</p></li><li><p>MFA policy overrides, MFA changes, and MFA removal.</p></li><li><p>Delegation of sensitive applications.</p></li><li><p>Supply chain providers accessing your tenants.</p></li></ul></li><li><p>Review session expiration policies to limit session hijack attacks.</p></li><li><p>Utilize tools to validate devices connected to your critical systems, such as Cloudflare Access Device Posture Check.</p></li><li><p>Practice defense in depth for your detection and monitoring strategies.</p></li></ul><p>Cloudflare’s Security and IT teams continue to remain vigilant after this compromise. If further information is disclosed by Okta or discovered through additional log analysis, we will publish an update to this post.</p><p><i>Cloudflare's Security Incident Response Team </i><a href="http://cloudflare.com/careers"><i>is hiring</i></a><i>.</i></p> ]]></content:encoded>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <guid isPermaLink="false">3tmgWjRNgroPDMiiOZFXsq</guid>
            <dc:creator>Sourov Zaman</dc:creator>
            <dc:creator>Lucas Ferreira</dc:creator>
            <dc:creator>Kimberly Hall</dc:creator>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/</link>
            <pubDate>Tue, 10 Oct 2023 12:02:09 GMT</pubDate>
            <description><![CDATA[ The “HTTP/2 Rapid Reset” attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric DDoS attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than any previous attack we’ve observed ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZiKpisozgw41RMD8tyuhu/006388958a618bffa6609ad532da5b91/Screenshot-2023-10-09-at-10.41.56-PM.png" />
            
            </figure><p>Earlier today, Cloudflare, along with Google and Amazon AWS, disclosed the existence of a novel zero-day vulnerability dubbed the “HTTP/2 Rapid Reset” attack. This attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric Distributed Denial of Service (DDoS) attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">any previous attack we’ve observed</a>, which exceeded 201 million requests per second (rps). Since the end of August 2023, Cloudflare has mitigated more than 1,100 other attacks with over 10 million rps — and 184 attacks that were greater than our previous DDoS record of 71 million rps.</p><em><small>Under attack or need additional protection? <a href="https://www.cloudflare.com/h2/">Click here to get help</a>.</small></em><br /><p>This zero-day provided threat actors with a critical new tool in their Swiss Army knife of vulnerabilities to exploit and attack their victims at a magnitude that has never been seen before. While at times complex and challenging to combat, these attacks allowed Cloudflare the opportunity to develop purpose-built technology to mitigate the effects of the zero-day vulnerability.</p><p>If you are using Cloudflare for HTTP DDoS mitigation, you are protected. And below, we’ve included more information on this vulnerability, and resources and recommendations on what you can do to secure yourselves.</p>
    <div>
      <h3>Deconstructing the attack: What every CSO needs to know</h3>
      <a href="#deconstructing-the-attack-what-every-cso-needs-to-know">
        
      </a>
    </div>
    <p>In late August 2023, our team at Cloudflare noticed a new zero-day vulnerability, developed by an unknown threat actor, that exploits the standard HTTP/2 protocol — a fundamental protocol that is critical to how the Internet and all websites work. This novel zero-day vulnerability attack, dubbed Rapid Reset, leverages HTTP/2’s stream cancellation feature by sending a request and immediately canceling it over and over.  </p><p>By automating this trivial “request, cancel, request, cancel” pattern at scale, threat actors are able to create a denial of service and take down any server or application running the standard implementation of HTTP/2. Furthermore, one crucial thing to note about the record-breaking attack is that it involved a modestly-sized botnet, consisting of roughly 20,000 machines. Cloudflare regularly detects botnets that are orders of magnitude larger than this — comprising hundreds of thousands and even millions of machines. For a relatively small botnet to output such a large volume of requests, with the potential to incapacitate nearly any server or application supporting HTTP/2, underscores how menacing this vulnerability is for unprotected networks.</p><p>Threat actors used botnets in tandem with the HTTP/2 vulnerability to amplify requests at rates we have never seen before. As a result, our team at Cloudflare experienced some intermittent edge instability. While our systems were able to mitigate the overwhelming majority of incoming attacks, the volume overloaded some components in our network, impacting a small number of customers’ performance with intermittent 4xx and 5xx errors — all of which were quickly resolved.</p><p>Once we successfully mitigated these issues and halted potential attacks for all customers, our team immediately kicked off a responsible disclosure process. We entered into conversations with industry peers to see how we could work together to help move our mission forward and safeguard the large percentage of the Internet that relies on our network prior to releasing this vulnerability to the general public.</p><p>We cover the technical details of the attack in more detail in a separate blog post: <a href="https://cfl.re/rapid-reset-breakdown">HTTP/2 Rapid Reset: deconstructing the record-breaking attack</a>.</p>
    <div>
      <h3>How is Cloudflare and the industry thwarting this attack?</h3>
      <a href="#how-is-cloudflare-and-the-industry-thwarting-this-attack">
        
      </a>
    </div>
    <p>There is no such thing as a “perfect disclosure.” Thwarting attacks and responding to emerging incidents requires organizations and security teams to live by an assume-breach mindset — because there will always be another zero-day, new evolving threat actor groups, and never-before-seen novel attacks and techniques.</p><p>This “assume-breach” mindset is a key foundation towards information sharing and ensuring in instances such as this that the Internet remains safe. While Cloudflare was experiencing and mitigating these attacks, we were also working with industry partners to guarantee that the industry at-large could withstand this attack.  </p><p>During the process of mitigating this attack, our Cloudflare team developed and purpose-built new technology to stop these DDoS attacks and further improve our own mitigations for this and other future attacks of massive scale. These efforts have significantly increased our overall mitigation capabilities and resiliency. If you are using Cloudflare, we are confident that you are protected.</p><p>Our team also alerted web server software partners who are developing patches to ensure this vulnerability cannot be exploited — check their websites for more information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ud1AqrVrYtnC11Bu0pwCh/eac88347347a8dc9420d6d13285f1d28/Zero-Day-protection-4.png" />
            
            </figure><p>Disclosures are never one and done. The lifeblood of Cloudflare is to ensure a better Internet, which stems from instances such as these. When we have the opportunity to work with our industry partners and governments to ensure there are no widespread impacts on the Internet, we are doing our part in increasing the cyber resiliency of every organization no matter the size or vertical.</p><p>To gain more of an understanding around mitigation tactics and next steps on patching, <a href="https://event.on24.com/wcc/r/4378646/EC4EB4A6CE2B363BC6378891E495BEBF">register for our webinar</a>.</p>
    <div>
      <h3>What are the origins of the HTTP/2 Rapid Reset and these record-breaking attacks on Cloudflare?</h3>
      <a href="#what-are-the-origins-of-the-http-2-rapid-reset-and-these-record-breaking-attacks-on-cloudflare">
        
      </a>
    </div>
    <p>It may seem odd that Cloudflare was one of the first companies to witness these attacks. Why would threat actors attack a company that has some of the most robust defenses against DDoS attacks in the world?  </p><p>The reality is that Cloudflare often sees attacks before they are turned on more vulnerable targets. Threat actors need to develop and test their tools before they deploy them in the wild. Threat actors who possess record-shattering attack methods can have an extremely difficult time testing and understanding how large and effective they are, because they don't have the infrastructure to absorb the attacks they are launching. Because of the transparency that we share on our network performance, and the measurements of attacks they could glean from our public performance charts, this threat actor was likely targeting us to understand the capabilities of the exploit.</p><p>But that testing, and the ability to see the attack early, helps us develop mitigations for the attack that benefit both our customers and industry as a whole.</p>
    <div>
      <h3>From CSO to CSO: What should you do?</h3>
      <a href="#from-cso-to-cso-what-should-you-do">
        
      </a>
    </div>
    <p>I have been a CSO for over 20 years, on the receiving end of countless disclosures and  announcements like this. But whether it was <a href="/exploitation-of-cve-2021-44228-before-public-disclosure-and-evolution-of-waf-evasion-patterns/">Log4J</a>, <a href="/solarwinds-orion-compromise-trend-data/">Solarwinds</a>, <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">EternalBlue</a> <a href="https://www.cloudflare.com/learning/security/ransomware/petya-notpetya-ransomware/">WannaCry/NotPetya</a>, <a href="/heartbleed-revisited/">Heartbleed</a>, or <a href="/inside-shellshock/">Shellshock</a>, all of these security incidents have a commonality. A tremendous explosion that ripples across the world and creates an opportunity to completely disrupt any of the organizations that I have led — regardless of the industry or the size.</p><p>Many of these were attacks or vulnerabilities that we may have not been able to control. But regardless of whether the issue arose from something that was in my control or not, what has set any successful initiative I have led apart from those that did not lean in our favor was the ability to respond when zero-day vulnerabilities and exploits like this are identified.    </p><p>While I wish I could say that Rapid Reset may be different this time around, it is not. I am calling all CSOs — no matter if you’ve lived through the decades of security incidents that I have, or this is your first day on the job — this is the time to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">ensure you are protected</a> and stand up your cyber incident response team.</p><p>We’ve kept the information restricted until today to give as many security vendors as possible the opportunity to react. However, at some point, the responsible thing becomes to publicly disclose zero-day threats like this. Today is that day. That means that after today, threat actors will be largely aware of the HTTP/2 vulnerability; and it will inevitably become trivial to exploit and kickoff the race between defenders and attacks — first to patch vs. first to exploit. Organizations should assume that systems will be tested, and take proactive measures to ensure protection.</p><p>To me, this is reminiscent of a vulnerability like Log4J, due to the many variants that are emerging daily, and will continue to come to fruition in the weeks, months, and years to come. As more researchers and threat actors experiment with the vulnerability, we may find different variants with even shorter exploit cycles that contain even more advanced bypasses.  </p><p>And just like Log4J, managing incidents like this isn’t as simple as “run the patch, now you’re done”. You need to turn incident management, patching, and evolving your security protections into ongoing processes — because the patches for each variant of a vulnerability reduce your risk, but they don’t eliminate it.</p><p>I don’t mean to be alarmist, but I will be direct: you must take this seriously. Treat this as a full active incident to ensure nothing happens to your organization.</p>
    <div>
      <h3>Recommendations for a New Standard of Change</h3>
      <a href="#recommendations-for-a-new-standard-of-change">
        
      </a>
    </div>
    <p>While no one security event is ever identical to the next, there are lessons that can be learned. CSOs, here are my recommendations that must be implemented immediately. Not only in this instance, but for years to come:</p><ul><li><p>Understand your external and partner network’s external connectivity to remediate any Internet facing systems with the mitigations below.</p></li><li><p>Understand your existing security protection and capabilities you have to protect, detect and respond to an attack and immediately remediate any issues you have in your network.</p></li><li><p>Ensure your DDoS Protection resides outside of your data center because if the traffic gets to your datacenter, it will be difficult to mitigate the DDoS attack.</p></li><li><p>Ensure you have DDoS protection for Applications (Layer 7) and ensure you have Web Application Firewalls. Additionally as a best practice, ensure you have complete DDoS protection for DNS, Network Traffic (Layer 3) and API Firewalls</p></li><li><p>Ensure web server and operating system patches are deployed across all Internet Facing Web Servers. Also, ensure all automation like Terraform builds and images are fully patched so older versions of web servers are not deployed into production over the secure images by accident.</p></li><li><p>As a last resort, consider turning off HTTP/2 and HTTP/3 (likely also vulnerable) to mitigate the threat.  This is a last resort only, because there will be a significant performance issues if you downgrade to HTTP/1.1</p></li><li><p>Consider a secondary, cloud-based DDoS L7 provider at perimeter for resilience.</p></li></ul><p>Cloudflare’s mission is to help build a better Internet. If you are concerned with your current state of DDoS protection, we are more than happy to provide you with our DDoS capabilities and resilience for free to mitigate any attempts of a successful DDoS attack.  We know the stress that you are facing as we have fought off these attacks for the last 30 days and made our already best in class systems, even better.</p><p>If you’re interested in finding out more, <a href="https://event.on24.com/wcc/r/4378646/EC4EB4A6CE2B363BC6378891E495BEBF">view our webinar</a> on the details of the zero-day and how to respond. <a href="https://www.cloudflare.com/h2/">Contact us</a> if you’re unsure whether you’re protected or want to understand how you can be. We also have more technical details of the attack in more detail in a separate blog post: <a href="https://cfl.re/rapid-reset-breakdown">HTTP/2 Rapid Reset: deconstructing the record-breaking attack</a>. Finally, if you’re being targeted or need immediate protection, please contact your local Cloudflare representative or visit the <a href="https://www.cloudflare.com/under-attack-hotline/">Cloudflare under attack page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">7fD3yG9bGZ8HGwcaFR5mP4</guid>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Why I joined Cloudflare as Chief Security Officer]]></title>
            <link>https://blog.cloudflare.com/why-i-joined-cloudflare-as-chief-security-officer/</link>
            <pubDate>Fri, 21 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ As someone who is passionate about technology, security, and its potential to improve our lives, I knew that I wanted to work for a company that shared those values.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>I am absolutely thrilled and feel incredibly blessed to have joined Cloudflare as Chief Security Officer (CSO). Cybersecurity has always been my passion and focus of my career. I am grateful to join such a dynamic and innovative team. Cloudflare is a cybersecurity industry leader and offers unmatched technology that is second to none.</p>
    <div>
      <h3>A little about me</h3>
      <a href="#a-little-about-me">
        
      </a>
    </div>
    <p>I have been a CSO for over 20 years in the financial and private sectors with SVB, HSBC, McAfee, Ameren, and Scottrade. I have been privileged to lead the security teams of some of the world's largest, most complex, and most innovative companies; however, my greatest honor has been working with and collaborating among some of the world's most amazing people. I have learned my dedication, expertise, and passion from my leaders, peers, and teams, which have taught me how to build and lead world-class security programs that <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect organizations from the most sophisticated threats</a>. Because security is constantly evolving, the key is, and always will be, to build an active, diverse community of highly empathetic people that will successfully protect the organization.</p>
    <div>
      <h3>My charter</h3>
      <a href="#my-charter">
        
      </a>
    </div>
    <p>As I step into my new role as CSO at Cloudflare, I am excited to take on the challenge of defending the company and 20% of all websites. My charter is to protect Cloudflare from sophisticated threats and to promote a culture of innovation that enables us to stay ahead of the curve in the ever-evolving cybersecurity landscape. By fostering a mindset of creativity and continuous improvement, we will develop solutions that protect our customers from the most complex cybersecurity challenges that significantly impact them.</p><p>The last aspect of my charter is to share the Cloudflare story with our customers to ensure they are protected and leverage all of the Cloudflare technology.  We can do this through collaboration and knowledge-sharing with our customers. By sharing the Cloudflare story and collaborating with our customers, we can all help build a better and more secure Internet.</p>
    <div>
      <h3>Why Cloudflare</h3>
      <a href="#why-cloudflare">
        
      </a>
    </div>
    <p>As someone who is passionate about technology, security, and its potential to improve our lives, I knew that I wanted to work for a company that shared those values. So, when I began my job search, I set out to find the best company to work for that aligned with my interests and career goals. After researching and considering many different options, I met with Cloudflare, and I was blown away.</p><p>First and foremost, I was drawn to Cloudflare's mission to help create a secure, faster, and more reliable Internet for everyone. I was impressed by their strong mission, direction, and commitment to building a better Internet. As someone who shares their passion for making the Internet a better place, I found it inspiring to join a company with a mission that aligns so closely with my own values.</p><p>Another reason I chose to join Cloudflare was its network capabilities and cloud technology. They have built a highly sophisticated and innovative global network that I have not seen matched within the industry. As a CSO, I find Cloudflare in a unique leadership position to protect our customers due to their unmatched capabilities and unique market position. While Cloudflare is already a leader in every space where they operate, they have a significant track record of building on their fantastic platform by continuously improving their technology to be best in class.</p><p>In addition to their impressive technology, I was also impressed by their customer base. The most prominent and respected companies in the world use Cloudflare's services, and I am excited to share "How Cloudflare does it" to help our customers be even more successful and give them a unique opportunity to see how we do it internally.</p><p>Lastly, the interview process and the people I met at Cloudflare significantly influenced my decision to join the team. Throughout my 17 interviews, I was impressed by the professionalism and passion of the people I met. I connected with each person and was excited by the team's commitment to the company's mission. I am very proud and humbled to join the Cloudflare family! I look forward to hearing from our customers and employees and how I can help them!</p> ]]></content:encoded>
            <category><![CDATA[Life at Cloudflare]]></category>
            <category><![CDATA[Careers]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">5d5Nk02N7CTBxyphi1TQUl</guid>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
    </channel>
</rss>