+33 (0)1 8695 8660
Blog Sécurité Informatique et Cybersécurité
Assurer votre veille technologique. Risques numériques. Sécurité Informatique.

Blog Sécurité Informatique

Ce blog a pour objectif premier de traiter de manière transverse de l'ensemble des thématiques liées à la cybersécurité, sécurité informatique et digitale, et la sécurité des systèmes d'information (SSI, InfoSec).

Mandrill, attaque sur la sécurité de ses clés API

Mandrill, le système professionnel d'emails transactionnels, vient de subir une récente attaque sur les mécanismes de sécurité dont ses clés API, fédérant la sécurité d'envois de systèmes -souvent massifs!- d'emails.

Nous ne pouvons qu'apprécier la transparence dont fait preuve Mandrill sur cette attaque, vis-à-vis du public, de ses clients et de ses partenaires. Des structures de plus en plus nombreuses, majoritairement de grandes structures ou multinationales, ou des structures du Web 2.0, intègrent des procédures de communication à l'égard des tiers en cas de suspicion d'attaque ou d'attaque avérée. D'autres procèdent de la sorte, par obligation règlementaire, imposée dans certains pays.

Nous ne pouvons que féliciter Mandrill, qui sans évidence réelle de compromission, communique ouvertement vis à vis des tiers. Ceci ne peut qu'améliorer le lien de confiance que l'on peut avoir avec Mandrill, malgré la situation délicate de nature négative (une attaque reste une attaque). Les clients apprécieront les mesures rapides et efficaces de sécurité mises en oeuvre. Bravo, Mandrill!

Important Security Notification From Mandrill We're writing to let you know that we recently discovered a security vulnerability in Mandrill's infrastructure that you should be aware of. At this time, we're confident that no customer data was compromised as a result of the vulnerability, but we feel it's our responsibility to let you know exactly what happened and what we're doing about it.

We discovered evidence on March 10 that automated attempts were made against Mandrill's internal logging servers in an effort to use them in a botnet. Analysis of the impacted servers, including network traffic logs and files present on the servers, indicates that these attempts were unsuccessful. There are no signs that the servers were targeted to access the data stored on them.

Upon further investigation, we found that the opportunity for this attack stemmed from a firewall change we made on February 20 in order to more granularly control access to some of Mandrill's servers. Parts of Mandrill's infrastructure are hosted with Amazon Web Services (AWS), and we use EC2 Security Groups to control access. One change was made to a security group that contained more servers than we intended to affect. As a result, a cluster of servers hosting Mandrill's internal application logs was made publicly accessible instead of allowing internal-only access.

As soon as we discovered this vulnerability on March 10, we took several immediate steps to mitigate the potential impact:
Impacted servers were disabled and taken offline, with log files and data backed up for further investigation. These servers will not be used in any way going forward.
In accordance with internal security protocols, we updated all of Mandrill's internal credentials, including SSH keys and our own API keys/passwords for external services.
The firewall rules in use for all of our AWS security groups were audited and updated to ensure they were correctly limiting access and that no other servers were impacted by the earlier change.

We're also making changes to our internal processes for managing security groups and firewall rules. That includes placing all security group rules into version-controlled configuration files with a tool to apply those rules via the EC2 API. This will allow us to more rigorously vet any rules or rule changes in advance, including more automated testing and robust audit logs for any proposed and approved changes. We're implementing additional regular, automated audits of our security groups as well.

There's no evidence that any customer data was queried or exported, but unfortunately, we can't completely rule out the possibility of access. So, we're being paranoid and letting you know the worst-case scenario. Although it's extremely unlikely, if we assume the attackers were able to access information stored on the servers when the firewall rules were changed, the following data about your Mandrill account could have been accessed:
Internal logs with basic log data about emails sent between February 6 and March 10. These logs include sender address, recipient address, and subaccount used (if any), but do not include custom metadata or message content.
Your API keys used for SMTP messages sent between February 13 and March 10 (because you sent via Mandrill's SMTP integration during that time period).
What you need to do:

Although there's no evidence that your API key was exposed or accessed, we strongly recommend deactivating all API keys for your account and generating new ones. Additionally, we offer several security-related features we encourage you to use:
Alerts to notify you when a new IP is used to access your account or your account information is updated
API key restrictions by IP or API call, based on how and where the API key is being used
Two-factor authentication using Yubikey, Google Authenticator, or SMS
IP whitelisting for limiting web-based access to your account
Account Security overview, which includes a list of IPs used to access your account, the method of access, and first and last date of access
Finally, we are deeply sorry for our error. We're committed to making the necessary changes to prevent something like this from happening again. Keeping our customers' data secure is integral to everything we do at Mandrill, and we're using this incident to identify and prioritize improvements to our internal systems and processes.



Pas encore de commentaire
lundi 22 avril 2024

Image Captcha

Newsletter Cybersécurité

Restez informé: recevez régulièrement les nouveautés et évènements en matière de cybersécurité et sécurité informatique.
En renseignant votre adresse email, vous acceptez de recevoir nos derniers articles de blog par courrier électronique et vous prenez connaissance de notre Politique de Confidentialité. Vous pouvez vous désinscrire à tout moment.

Notre expertise cybersécurité validée par de multiples certifications internationales

certifications sécurité informatique AKAOMA