A major supply chain attack is underway, originating from a security breach at Anodot, an AI-powered cloud cost monitoring and analytics company. The notorious extortion group ShinyHunters has claimed responsibility, stating they compromised Anodot's systems and stole authentication tokens. These tokens, which grant programmatic access to third-party services, were then used to infiltrate the Snowflake cloud data warehouse environments of Anodot's customers. This allowed the attackers to bypass conventional security measures like MFA and steal sensitive data from numerous organizations. ShinyHunters has begun extorting victims, including gaming giant Rockstar Games, threatening to leak stolen data if ransoms are not paid. The incident highlights the critical and often overlooked risk posed by third-party SaaS integrations and the value of API keys and service tokens as a target for threat actors.
This is a sophisticated supply chain attack that abuses the trust relationship between a SaaS vendor (Anodot) and its customers' cloud platforms (Snowflake). The attack chain is as follows:
This method is particularly insidious because it bypasses the victims' own perimeter defenses and authentication controls. The compromise of a single vendor can provide the keys to dozens of downstream customer environments.
The core of this attack is the abuse of stolen API tokens/service credentials, a technique classified under T1528 - Steal Application Access Token. These tokens are designed for machine-to-machine communication and often have broad permissions, making them a highly valuable target.
T1195.001 - Compromise Software Supply Chain: Compromise Third-party Software/Service: The entire incident is a textbook example of compromising a service to attack its customers.T1528 - Steal Application Access Token: The key enabler of the attack was the theft of authentication tokens from Anodot.T1580 - Cloud Infrastructure Discovery: Once in the Snowflake environment, attackers would have performed discovery to identify valuable data.T1213.002 - Data from Information Repositories: Data from Cloud Storage Object: The exfiltration of data from Snowflake.T1657 - Financial Theft: The ultimate goal of the extortion campaign.The impact is significant and widespread, affecting multiple companies across different industries.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| log_source | Snowflake Access History |
Look for queries or data access from the Anodot service account that are outside the established baseline, such as accessing unusual tables or exfiltrating large volumes of data. | Snowflake query logs and access history views. | high |
| user_account_pattern | ANODOT_SERVICE_USER |
Monitor for anomalous behavior from service accounts, such as logins from new IP ranges or attempts to access resources beyond their normal scope. | Cloud provider audit logs (e.g., CloudTrail). | high |
| api_endpoint | Snowflake API |
Unusually high volume of GET requests or data transfer from a specific service account token. |
API gateway logs, Cloud provider flow logs. | medium |
Detecting this type of attack is challenging because the activity appears legitimate.
Preventing such attacks requires a robust third-party risk management strategy.
Apply the principle of least privilege to all service accounts and API tokens, granting them only the specific permissions needed to function.
Mapped D3FEND Techniques:
Continuously audit and monitor the activity of third-party service accounts for anomalous behavior, such as accessing unusual data or large-scale exfiltration.
Mapped D3FEND Techniques:
Use IP address allowlisting to restrict service account access to only the known IP ranges of the trusted vendor.
Extend risk management to the supply chain by conducting thorough security assessments of third-party vendors before integration.
To defend against attacks like the Anodot/Snowflake breach, organizations must implement Resource Access Pattern Analysis for all third-party service accounts. Instead of implicitly trusting the connection, security teams should use a Cloud-Native Application Protection Platform (CNAPP) or SIEM to baseline the service's normal behavior. For Anodot, this would mean establishing a profile of which specific Snowflake tables it queries, the frequency of those queries, and the typical volume of data returned. The system should then alert on any deviation from this pattern. For example, an alert should trigger if the Anodot service account suddenly queries a table named 'customer_pii' or 'source_code_gta7' that it has never touched before, or if it attempts to download 100x its normal data volume. This behavioral detection approach is critical for identifying when a legitimate, stolen token is being abused by an attacker.
Organizations must apply rigorous Application Configuration Hardening to all third-party integrations. In the context of Snowflake, this means creating a dedicated role for the Anodot service with narrowly scoped, read-only access to only the specific schemas and tables required for cost analysis. The account should be explicitly denied access to all other data. Furthermore, network policies should be applied within Snowflake to restrict the service account's access to a specific, allow-listed set of source IP addresses provided by Anodot. This combination of least-privilege access and network controls would have mitigated this attack in two ways: first, the attackers would have been unable to access sensitive data outside the intended scope, and second, they would have been blocked from using the stolen token from their own infrastructure. This turns a trusted integration from a skeleton key into a key that only opens one specific door.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats