<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2310 Information about the Snowflake credential incident</title><link>https://community.appian.com/support/w/kb/3549/kb-2310-information-about-the-snowflake-credential-incident</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2310 Information about the Snowflake credential incident</title><link>https://community.appian.com/support/w/kb/3549/kb-2310-information-about-the-snowflake-credential-incident</link><pubDate>Tue, 04 Jun 2024 13:17:32 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:100cec6f-cb86-467e-a09b-9e8c18bc7b80</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3549/kb-2310-information-about-the-snowflake-credential-incident#comments</comments><description>Current Revision posted to Appian Knowledge Base by Ryan Good on 6/4/2024 1:17:32 PM&lt;br /&gt;
&lt;h2 id="mcetoc_1hvhma8f22"&gt;&lt;span style="font-weight:400;"&gt;Summary&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2024, a&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments"&gt;&lt;span style="font-weight:400;"&gt;threat advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;was published detailing that threat actors were observed using stolen customer credentials to target organizations utilizing Snowflake databases. Snowflake has since&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;a href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access"&gt;&lt;span style="font-weight:400;"&gt;published a response&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;stating their partnership with CrowdStrike and Mandiant in conducting a forensic investigation, and detailing preliminary findings and mitigating steps.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Snowflake is not natively used within Appian Cloud. Any Appian Cloud customers utilizing Snowflake via integration should contact Snowflake directly to determine impact. Appian will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2 id="mcetoc_1hvhm9djo1"&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments"&gt;&lt;span style="font-weight:400;"&gt;https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access"&gt;&lt;span style="font-weight:400;"&gt;https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hvhm7e4q0"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed:&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;June 4, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item><item><title>KB-2310 Information about the Snowflake credential incident</title><link>https://community.appian.com/support/w/kb/3549/kb-2310-information-about-the-snowflake-credential-incident/revision/1</link><pubDate>Tue, 04 Jun 2024 13:12:18 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:100cec6f-cb86-467e-a09b-9e8c18bc7b80</guid><dc:creator>Ryan Good</dc:creator><comments>https://community.appian.com/support/w/kb/3549/kb-2310-information-about-the-snowflake-credential-incident#comments</comments><description>Revision 1 posted to Appian Knowledge Base by Ryan Good on 6/4/2024 1:12:18 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;On 31-May-2024, a &lt;/span&gt;&lt;a href="https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments"&gt;&lt;span style="font-weight:400;"&gt;threat advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; was published detailing that threat actors were observed using stolen customer credentials to target organizations utilizing Snowflake databases. Snowflake has since &lt;/span&gt;&lt;a href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access"&gt;&lt;span style="font-weight:400;"&gt;published a response&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; stating their partnership with CrowdStrike and Mandiant in conducting a forensic investigation, and detailing preliminary findings and mitigating steps.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Snowflake is not natively used within Appian Cloud. Any Appian Cloud customers utilizing Snowflake via integration should contact Snowflake directly to determine impact. Appian will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments"&gt;https://www.mitiga.io/blog/tactical-guide-to-threat-hunting-in-snowflake-environments&lt;/a&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;span style="font-weight:400;"&gt;&lt;a href="https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access"&gt;https://community.snowflake.com/s/question/0D5VI00000Emyl00AB/detecting-and-preventing-unauthorized-user-access&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="mcetoc_1hvhm0sm80"&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed: &lt;/span&gt;&lt;span style="font-weight:400;"&gt;June 4, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>