What Information Was Viewed or Stolen?Īs of this writing, no consumer or employee data has gone public resulting from this breach. Alternatively, if the breach came as a system vulnerability from AWS, far more organizations may have information at risk. If the bad actors stole the AMS password in a phishing plot or discovered as a system misconfiguration, human error may have encouraged the breach. The notice provided on Sumo Logic’s website describes nothing else about how the unauthorized party made the attack possible this may be for various reasons. In the past, the compromised account had a stable password the assailants used that credential to reach Sumo’s accounts. Sumo Logic’s breach occurred via one of their Amazon Web Service (AWS) accounts. On November 7th, they posted a breach notice to their website they stopped the attack before the data could be unencrypted. Sumo’s clients come from various industries, including airlines and video game franchises. Cloud-native and analytic solutions provider Sumo Logic has announced a cybersecurity incident stemming from a compromised AWS account.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |