• Eager Eagle@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    tl;dr of the damage

    no Cloudflare customer data or systems were impacted by this event. Because of our access controls, firewall rules, and use of hard security keys enforced using our own Zero Trust tools, the threat actor’s ability to move laterally was limited. […] No services were implicated, and no changes were made to our global network systems or configuration.

    The only production systems the threat actor could access using the stolen credentials was our Atlassian environment. Analyzing the wiki pages they accessed, bug database issues, and source code repositories, it appears they were looking for information about the architecture, security, and management of our global network; no doubt with an eye on gaining a deeper foothold.