Cloudflare employees were recently targeted by a “sophisticated” cyberattack, and even though some fell for the scheme, the DDoS protection company managed to successfully defend itself. 

In a blog post(opens in new tab), Cloudflare co-founder Matthew Prince, together with team members Daniel Stinson-Diess and Sourov Zaman, explained how the attack happened and what made the difference between success and failure.

The threat actor made a couple of key preparations ahead of the attack: they registered a domain that looked legitimate and would fool many victims: cloudflare-okta.com. Okta is Cloudflare’s identity provider. They also managed to somehow obtain the phone numbers of almost 80 Cloudflare employees, as well as family members for some.


More

ars Technica: Phishers who breached Twilio and targeted Cloudflare could easily get you, too

At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced…

Read More →

Cloudflare: The mechanics of a sophisticated phishing scam and how we stopped it

Yesterday, August 8, 2022, Twilio shared that they’d been compromised by a targeted phishing attack. Around…

Read More →

CFPB: Insufficient data protection or security for sensitive consumer information

Consumer Financial Protection Circular 2022-04 Insufficient data protection or security for sensitive consumer information Question…

Read More →