A sophisticated nation-state adversary with advanced capabilities attacked Jumpcloud with a spear phishing attack.
JumpCloud is a US-based zero-trust directory platform that customers use to authenticate, authorize, and manage users, devices, and applications.
On July 12, JumpCloud disclosed that its systems were breached by unknown threat actors targeting a small set of customers on its official page.
The chief information security officer BOB confirmed they took appropriate steps and mitigated the threat on the customers’ side.
On June 27 at 15:13 UTC, the team discovered abnormal activity on their internal orchestration system.
Further analysis and investigation of the team revealed that their infrastructure was perpetrated by unauthorized access through a phishing attempt a month ago.
Immediately, they activated their incident response team to investigate all the logs to analyze the threat’s further impact and potential activity.
As they haven’t seen any impact on the customer’s side, however, as a precautionary measure, they rotated credentials and rebuilt infrastructure.
Additionally, They are connected with the law enforcement team with their investigation plan.
On July 5 at 03:35 UTC, they reset and generated new API keys for their customers as they discovered a small set of customers were impacted.
Also, they worked closely with affected customers to fix the threat and mitigate further activity of the APT.
This is a targeted attack where specific customers of Jumpcloud were targeted by the data injection method on its command framework.
“Our strongest line of defense is through information sharing and collaboration to secure their environments against this threat,” said Bob.
The Jumpcloud shared a detailed list of IOCs discovered on its official page. They are working further with government and industry partners to share information about this threat.
Indicator of compromise