> series: anatomy_of_a_breach —— part: 128 —— target: imperva —— data: api_keys_tls_certs_passwords —— irony: security_vendor_breached<span class="cursor-blink">_</span>_
In August 2019, Imperva disclosed that customer data from its Cloud WAF (Web Application Firewall) product — formerly known as Incapsula — had been exposed in a security incident. The compromised data included customer email addresses, hashed and salted passwords, and — critically — API keys and TLS/SSL certificates belonging to customers who used Imperva's Cloud WAF service. The exposure of API keys and TLS certificates meant that customers' own security configurations were potentially compromised.
The breach originated from a cloud migration during which an internal AWS API key was left exposed — enabling an attacker to access a database snapshot containing customer data. The irony was inescapable: Imperva, a cybersecurity company whose Cloud WAF product is designed to protect organisations from exactly the type of attack that led to the Capital One breach one month earlier, had been breached through the same class of cloud misconfiguration. Like HBGary Federal (2011), Hacking Team (2015), and LastPass (2015), the Imperva breach demonstrated that security expertise does not confer security immunity.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe Imperva breach was the latest in a pattern documented throughout this series: security vendors — RSA (2011), Hacking Team (2015), LastPass (2015), Cloudflare (2017), and now Imperva (2019) — are themselves targets, and their compromises create supply chain risk for every customer who depends on them.
The Imperva breach reinforced that security vendor selection must include evaluation of the vendor's own security posture — not just their product's features. For UK organisations selecting WAF, CDN, SIEM, or managed security providers, the provider's own security practices are a critical evaluation criterion. Cyber Essentials addresses supply chain security. Our cloud configuration reviews assess cloud-based security service configurations. SOC in a Box monitors for the anomalous activity that indicates supply chain compromise. And UK Cyber Defence provides incident response when a vendor breach affects your organisation.
<a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain risk. Our <a href="/penetration-testing/cloud-configuration-review">cloud reviews</a> assess vendor integrations. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for supply chain compromise.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call