CircleCI announced on January 4, 2023 that it experienced a security incident involving the exploit of a malware-infected user laptop to gain access to the company’s production systems. As part of the breach, hackers accessed and exfiltrated some CircleCI customer data. While those data were encrypted at rest, hackers were also able to gain access to some encryption keys.
Your systems or applications could be at risk of exploit if you have data stored in CircleCI. The company published advice for their customers to conduct forensic analysis to detect potential compromise in its January 4 security alert, which they are updating on an ongoing basis, as well as in its final incident report. As part of their remediation and recovery process, CircleCI shut down access for the infected user and most employees, implemented a step-up authentication program for those with access, set up more robust alerting, updated anti-malware systems to block malicious traffic, rotated infected hosts and revoked or rotated tokens, and notified customers, instructing them to rotate all secrets on the service. They share a CLI script for fetching all secrets from CircleCI, detail changes to the CircleCI API, and offer comprehensive audit logs to customers upon request.
While this incident occurred in CircleCI, it could happen in other tools as well. If you store sensitive data in similar systems in the cloud, make sure you have a regular review process that includes:
Beyond rotating your secrets stored in CircleCI and other cloud-based tools, make sure to find and eliminate them from your codebase as well. Fix them at the source, and ideally search for secrets in an ongoing, programmatic way.
You can use the Dazz Remediation Cloud to identify rogue pipelines, detect access sprawl, see secrets in code, reduce to root causes, and automatically remediate vulnerabilities and misconfigurations to close your risk window in a fraction of the time.
Dazz provides real-time visibility into the security of an organization's Cloud environment, allowing organizations to quickly identify and respond to security incidents and get visibility to the organization pipelines.
With the ability to detect and remediate threats in real time, organizations can limit the impact of a breach and minimize downtime of the production environment and critical assets.
by Julie O’Brien, an interview with Senior Solutions Engineer Matt Brown
Risk can go undetected when full context of the SDLC is missing