Incident Details
Victimized Company: | Drizly |
Incident Dates: | 2020-06-12 to 2020-06-13 |
Disclosure Date: | 2020-06-28 |
Current Status: | Threat Actor Unknown |
Victimized Company: | Drizly |
Incident Dates: | 2020-06-12 to 2020-06-13 |
Disclosure Date: | 2020-06-28 |
Current Status: | Threat Actor Unknown |
In July 2020, Drizly, an on-demand alcohol delivery service, suffered a data breach that exposed the personal information of over 2 million users data. The source of the breach was an executive’s GitHub account that was the victim of a credential-stuffing attack. With access to GitHub, the attacker could find AWS credentials, reconfigure AWS security settings, and access a customer database, leading to the leak of 2 million user records.
In July 2020, Drizly, an on-demand alcohol delivery service, suffered a data breach from an unknown attacker. In April 2018, Drizly granted a company executive access to the company’s GitHub repositories so that he could participate in a one-day hackathon. The executive maintained permissions long after the hackathon ended. In July 2020, an attacker accessed the executive’s GitHub account by reusing credentials from an unrelated breach. The executive’s GitHub password was only seven characters long with no special characters and failed to enable Mult-factor Authentication. This granted the attacker access to all of Drizly’s GitHub repositories. The attacker cloned one of these repositories, which held credentials later used to access the company’s AWS infrastructure. The attacker modified a security group to access an AWS RDS database containing customer data. The attacker then exfiltrated 2.5 million consumer records.
Date | Event |
---|---|
April 2018 | Drizly grants a company executive access to its GitHub repository so that he can participate in a one-day hackathon. |
July 2020 | An attacker accessed the company’s executive personal Github account using credentials from an unrelated breach. The attacker accessed all of Drizly’s GitHub repositories through the executive’s GitHub account. One repository contained AWS credentials which allowed the attacker access to the AWS infrastructure, where they manipulated security settings to allow them access to the company’s RDS Databases, which contained the data of over 2 million users. |
July 28th, 2020 | Drizly releases a public statement regarding the breach. |
October 24th, 2022 | FTC begins investigating Drizly. |
January 10th, 2023 | FTC finalizes a complaint against Drizly, requiring them to destroy any personal data collected if it’s not necessary to provide products or services. If it’s essential, they must outline a specific retention schedule. Lastly, Drizly and its CEO must implement a security program and establish safeguards to protect against further security incidents. |
January 15th, 2024 | Uber announces it is shutting down Drizly, which it acquired in Feb 2021 for $1.1 billion. |
No known attribution at this time.
The FTC initiated an investigation looking at Drizly’s security practices. The FTC concluded from this investigation that multiple failures allowed the attacker to access the customer’s data. This investigation is unique because the FTC also required CEO James Cory Rellas to implement information security programs at any future company he works for.
Drizly was also sued by those whose data was leaked. The settlement is valued between $3.35 million and $7 million.
The division was shutdown by Uber in March 2024.
The Drizly case is another example of AWS credentials found in a source-code repository leading to a data breach. In this case, the failures were: