Open Nav
Sign Up

Cloudflare Endures Sophisticated Breach Tracing Back to Okta Compromise

Bar Refael

February 4, 2024

Cloudflare, a leader in web infrastructure and DDoS protection, fell victim to a sophisticated cyberattack, believed to be the work of a nation-state actor. The attackers sought persistent and widespread access to Cloudflare’s global network, leveraging stolen credentials from a prior Okta support system breach in October 2023. Despite the elaborate intrusion tactics, Cloudflare’s vigilant response and robust security measures limited the attack’s impact, ensuring no customer data or critical system configurations were compromised.

Incident Details:

  • Attack Timeline and Tactics: The threat actor initially accessed Cloudflare’s self-hosted Atlassian server on November 14, 2023, later establishing persistent access and infiltrating Cloudflare’s Confluence, Jira, and Bitbucket systems. Attempts to breach a non-production data center in São Paulo were thwarted.
  • Credential Misuse: The breach was facilitated by one access token and three service account credentials previously stolen during the Okta breach, which Cloudflare had overlooked to rotate.
  • Internal Reconnaissance: The attackers conducted a four-day reconnaissance operation, scoping out Cloudflare’s internal systems and later establishing a rogue Atlassian user account for sustained access.

Security Measures and Response:

  • Immediate Containment: Cloudflare detected the malicious activity on November 23, terminated the threat actor’s access by November 24, and initiated a thorough investigation with CrowdStrike’s assistance.
  • Comprehensive Remediation Efforts: Cloudflare undertook extensive measures including rotating over 5,000 production credentials, segmenting test and staging systems, conducting forensic triages on 4,893 systems, and reimaging and rebooting every machine across its global network, including all accessed systems and Atlassian products.
  • Data Center Security: Equipment in the São Paulo data center was returned to manufacturers to guarantee absolute security, despite the threat actor’s failed access attempts.

Impact and Implications:

  • Limited Operational Impact: Cloudflare emphasized that the breach did not affect customer data, services, or global network systems. The meticulous analysis of accessed documentation and source code indicated the attackers aimed to understand the architecture, security, and management of Cloudflare’s global network.
  • Source Code Exposure: Though the attackers viewed up to 120 code repositories, only 76 were believed to be exfiltrated, focusing on Cloudflare’s backup processes, global network configuration, identity management, remote access, and use of Terraform and Kubernetes.

The Cloudflare breach, executed by leveraging credentials stolen from a previous Okta incident, underscores the persistent risks associated with supply chain attacks and credential management. The incident highlights the critical need for robust credential rotation policies, comprehensive system monitoring, and the importance of swift, coordinated incident response. While Cloudflare’s swift actions and zero-trust security approach significantly mitigated the breach’s impact, the incident serves as a stark reminder of the sophistication of nation-state actors and the continuous threat they pose to global networks and infrastructures.

Stay safe and informed,

OP Innovate.

Resources highlights

CISA: Attackers Exploiting SysAid Vulnerabilities (CVE-2025-2775, CVE-2025-2776)

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two SysAid On-Prem vulnerabilities, CVE-2025-2775 and CVE-2025-2776, to its Known Exploited Vulnerabilities (KEV) catalog, confirming…

Read more >

CVE-2025-2775, CVE-2025-2776

Critical Zero-Day in CrushFTP Exploited in the Wild (CVE-2025-54309)

A critical zero-day vulnerability in CrushFTP, CVE-2025-54309, is being actively exploited by threat actors to gain unauthenticated administrative access to vulnerable servers via HTTPS. The…

Read more >

CVE-2025-54309

Critical Zero-Day in Microsoft SharePoint Actively Exploited (CVE-2025-53770)

A newly discovered zero-day vulnerability in Microsoft SharePoint Server, tracked as CVE-2025-53770, is currently being exploited in active attacks against on-premises environments. The flaw, rated…

Read more >

CVE-2025-53770

Over 600 Laravel Applications Vulnerable to Remote Code Execution via Leaked APP_KEYs (CVE-2018-15133, CVE-2024-55556)

Security researchers have uncovered a major RCE threat affecting over 600 Laravel applications, triggered by leaked APP_KEYs found on public GitHub repositories. Laravel's APP_KEY, typically…

Read more >

CVE-2018-15133, CVE-2024-55556

CVE-2025-3648: “Count(er) Strike” Vulnerability in ServiceNow

CVE-2025-3648, dubbed “Count(er) Strike”, is a high-severity vulnerability (CVSS 8.2) in ServiceNow's Now Platform, discovered by Varonis Threat Labs. The flaw allows both authenticated and…

Read more >

CVE-2025-3648

What to Look for in a Pentesting Platform (Beyond Just Scans)

Penetration testing platforms are a great way to centralize vulnerability discovery and triage. However, when evaluating penetration testing platforms, many organizations make the mistake of…

Read more >

pentesting platform
Under Cyber Attack?

Fill out the form and we will contact you immediately.