Anatomy of a Breach

Anatomy of a Breach: Imperva — When the Security Vendor Protecting Your Data Was Breached

> series: anatomy_of_a_breach —— part: 128 —— target: imperva —— data: api_keys_tls_certs_passwords —— irony: security_vendor_breached<span class="cursor-blink">_</span>_

Hedgehog Security 31 August 2019 12 min read

The company that protects you from breaches was itself breached.

In August 2019, Imperva disclosed that customer data from its Cloud WAF (Web Application Firewall) product — formerly known as Incapsula — had been exposed in a security incident. The compromised data included customer email addresses, hashed and salted passwords, and — critically — API keys and TLS/SSL certificates belonging to customers who used Imperva's Cloud WAF service. The exposure of API keys and TLS certificates meant that customers' own security configurations were potentially compromised.

The breach originated from a cloud migration during which an internal AWS API key was left exposed — enabling an attacker to access a database snapshot containing customer data. The irony was inescapable: Imperva, a cybersecurity company whose Cloud WAF product is designed to protect organisations from exactly the type of attack that led to the Capital One breach one month earlier, had been breached through the same class of cloud misconfiguration. Like HBGary Federal (2011), Hacking Team (2015), and LastPass (2015), the Imperva breach demonstrated that security expertise does not confer security immunity.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Your security provider is part of your attack surface.

The Imperva breach was the latest in a pattern documented throughout this series: security vendors — RSA (2011), Hacking Team (2015), LastPass (2015), Cloudflare (2017), and now Imperva (2019) — are themselves targets, and their compromises create supply chain risk for every customer who depends on them.

API Keys and TLS Certificates Exposed
The exposure of customer API keys and TLS certificates was particularly damaging — these credentials could be used to bypass the very security controls that Imperva's product provided. <a href="/penetration-testing/cloud-configuration-review">Cloud configuration reviews</a> assess API key management and certificate security.
Cloud Migration Risk — Again
Like <a href="/blog/anatomy-of-a-breach-capital-one">Capital One</a>, the Imperva breach originated from a cloud migration error — an exposed AWS API key. Cloud migrations introduce transient risk windows where misconfigurations can expose sensitive data. Our <a href="/penetration-testing/cloud-configuration-review">cloud reviews</a> are frequently commissioned during and after cloud migrations.
Supply Chain Trust Challenged
Organisations trust their WAF vendor with their most sensitive traffic — the vendor sees every request and response. When that vendor is breached, customer security configurations, certificates, and API keys are at risk. <a href="/blog/sector-under-the-microscope-professional-services">Supply chain analysis</a> is essential for evaluating vendor security.
Security Vendors Must Practise What They Preach
Imperva, RSA, Hacking Team, LastPass, Cloudflare — five security vendors breached in this series. The lesson: no organisation, regardless of its expertise, is immune. Our <a href="/penetration-testing">penetration testing</a> is based on the principle that claims of security must be verified through testing.

Evaluate your vendors' security with the same rigour as your own.

The Imperva breach reinforced that security vendor selection must include evaluation of the vendor's own security posture — not just their product's features. For UK organisations selecting WAF, CDN, SIEM, or managed security providers, the provider's own security practices are a critical evaluation criterion. Cyber Essentials addresses supply chain security. Our cloud configuration reviews assess cloud-based security service configurations. SOC in a Box monitors for the anomalous activity that indicates supply chain compromise. And UK Cyber Defence provides incident response when a vendor breach affects your organisation.


Imperva protects organisations from breaches — and was breached itself. Have you evaluated your vendors' security?

<a href="/cyber-essentials">Cyber Essentials</a> addresses supply chain risk. Our <a href="/penetration-testing/cloud-configuration-review">cloud reviews</a> assess vendor integrations. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for supply chain compromise.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles