Compromised AWS API Key Allowed Access to Imperva Customer Data

Imperva has shared more information on how hackers managed to obtain information on Cloud Web Application Firewall (WAF) customers, and revealed that the incident involved a compromised administrative API key.


California-based Imperva revealed in late August that it had become aware of a security incident affecting customers of its Cloud WAF product, formerly known as Incapusla. An initial investigation revealed that the breach impacted customers who had accounts through September 15, 2017.


The compromised database stored email addresses, hashed and salted passwords, API keys and TLS keys.


Imperva revealed last week that it learned of the compromised data on August 20 after being contacted by someone who had requested a bug bounty. The investigation launched by the company revealed — based on a detailed analysis of logs — that the data was actually exfiltrated in October 2018.


“We compared the SQL dump in the provided dataset to our snapshots and found a match. As of this post, we can say that the elements of customer data defined above were limited to Cloud WAF accounts prior and up to September 15, 2017. Databases and snapshots for our other product offerings were not exfiltrated,” explained Kunal Anand, CTO of Imperva.


Imperva says the incident is related to the process of adopting cloud technologies and migrating its user database to AWS. This process started in 2017 in response to an increasing number of customers.


At the time, Imperva developers created a customer database snapshot for testing and an internal compute instance that had been accessible from the outside. The internal compute instance contained an AWS API key, which got stolen after the instance was compromised. The attackers then used tha ..

Support the originator by clicking the read the rest link below.