Incident Details
Victimized Company: | BrowserStack |
Incident Dates: | 2014-11-09 to 2014-11-11 |
Disclosure Date: | 2014-11-11 |
Current Status: | Perpetrator Unknown |
Victimized Company: | BrowserStack |
Incident Dates: | 2014-11-09 to 2014-11-11 |
Disclosure Date: | 2014-11-11 |
Current Status: | Perpetrator Unknown |
In November 2014 BrowserStack, a cloud testing platform for cross-platform testing of different applications, was breached through an old prototype machine that had not been updated and was vulnerable to the shellshock exploit. The attacker created an IAM user and generated a keypair. The attacker accessed the email list and used AWS Simple Email Service to send emails to 5,000 users falsely stating BrowserStack was shutting down.
BrowserStack provides customers with a cloud testing platform to allow developers to test their applications on multiple browsers and mobile applications on all mobile devices without any virtual machines, devices, or emulators. BrowserStack’s configuration consists of thousands of servers.
An attacker discovered an EC2 instance that had been running since 2012, was not in active use, and was subject to the recently discovered shellshock vulnerability. BrowserStack had not patched that machine due to it being inactive. The old machine also held the AWS API access keys.
Using the compromised AWS Access Keys, the user established persistence by creating a new IAM User, SSH Key, and launching a new EC2 Instance. From that instance the attacker mounted a “backup disk” and discovered credentials to a database containing customer credentials. The attacker added his IP address to the database security group, and copied one of the database tables containing some user information, their email, hashed passwords, and the last tested URL. The attacker locked the database table, triggering an operational outage which alerted BrowerStack to the compromise.
While the BrowserStack team investigated the incident, the attacker used the data he was able to copy and credentials he had for the Amazon Simple Email Service (SES) to send out an email to the email addresses he exfiltrated stating that BrowserStack was shutting down and that BrowserStack was never as secure as they marketed themselves to be.
Date | Event |
---|---|
November 9th, 2014 | An attacker gained unauthorized access to BrowserStack’s AWS Infrastructure. The attacker then sent a phishing email to 1000 users stating BrowserStack was shutting down, citing that BrowserStack had lied regarding their security measures. |
November 11th, 2014 | BrowserStack releases a post-mortem statement regarding the attack. BrowserStack takes full responsibility for the attack and explains the remediation tactics they implemented. |
No known attribution at this time.