Public Cloud Security Breaches Documenting their mistakes so you don't make them.

Drizly (2020)

Incident Details

Victimized Company:Drizly
Incident Dates:2020-06-12 to 2020-06-13
Disclosure Date:2020-06-28
Current Status:Threat Actor Unknown

In July 2020, Drizly, an on-demand alcohol delivery service, suffered a data breach that exposed the personal information of over 2 million users data. The source of the breach was an executive’s GitHub account that was the victim of a credential-stuffing attack. With access to GitHub, the attacker could find AWS credentials, reconfigure AWS security settings, and access a customer database, leading to the leak of 2 million user records.

Incident

Details of the Incident

In July 2020, Drizly, an on-demand alcohol delivery service, suffered a data breach from an unknown attacker. In April 2018, Drizly granted a company executive access to the company’s GitHub repositories so that he could participate in a one-day hackathon. The executive maintained permissions long after the hackathon ended. In July 2020, an attacker accessed the executive’s GitHub account by reusing credentials from an unrelated breach. The executive’s GitHub password was only seven characters long with no special characters and failed to enable Mult-factor Authentication. This granted the attacker access to all of Drizly’s GitHub repositories. The attacker cloned one of these repositories, which held credentials later used to access the company’s AWS infrastructure. The attacker modified a security group to access an AWS RDS database containing customer data. The attacker then exfiltrated 2.5 million consumer records.

Timeline

Date Event
April 2018 Drizly grants a company executive access to its GitHub repository so that he can participate in a one-day hackathon.
July 2020 An attacker accessed the company’s executive personal Github account using credentials from an unrelated breach. The attacker accessed all of Drizly’s GitHub repositories through the executive’s GitHub account. One repository contained AWS credentials which allowed the attacker access to the AWS infrastructure, where they manipulated security settings to allow them access to the company’s RDS Databases, which contained the data of over 2 million users.
July 28th, 2020 Drizly releases a public statement regarding the breach.
October 24th, 2022 FTC begins investigating Drizly.
January 10th, 2023 FTC finalizes a complaint against Drizly, requiring them to destroy any personal data collected if it’s not necessary to provide products or services. If it’s essential, they must outline a specific retention schedule. Lastly, Drizly and its CEO must implement a security program and establish safeguards to protect against further security incidents.
January 15th, 2024 Uber announces it is shutting down Drizly, which it acquired in Feb 2021 for $1.1 billion.

Attribution / Perpetrator

No known attribution at this time.

Long-term impact

The FTC initiated an investigation looking at Drizly’s security practices. The FTC concluded from this investigation that multiple failures allowed the attacker to access the customer’s data. This investigation is unique because the FTC also required CEO James Cory Rellas to implement information security programs at any future company he works for.

Drizly was also sued by those whose data was leaked. The settlement is valued between $3.35 million and $7 million.

The division was shutdown by Uber in March 2024.

Summary of Coverage

Cloud Security lessons learned

The Drizly case is another example of AWS credentials found in a source-code repository leading to a data breach. In this case, the failures were:

  1. Failed to scan GitHub for secrets, as the attacker found AWS and RDS credentials in the source code.
  2. Failed to ensure that all users in their GitHub Organization had Multi-Factor Authentication.
  3. Failed to review access to GitHub to ensure users were active and limited to only the repositories they needed access to.