Sounds like the customers affected deserved anything and everything they got.
Which doesn't negate the fact that these gangs are scum and should be ejected into space for the benefit of Humanity.
An unknown financially motivated crime crew has swiped a "significant volume of records" from Snowflake customers' databases using stolen user-level credentials, according to Mandiant. "To date, Mandiant and Snowflake have notified approximately 165 potentially exposed organizations," the Google-owned threat hunters wrote on …
I have every account I can protected by 2FA with my trusty Google Authenticator app (other authentication apps are available), and backup passcodes saved into Bitwarden (other password managers are available).
No security is 100% perfect, but I will settle for an easy x<100% knowing the bad guys will just move on.
I have not found a bank in the US where I can use it's services that uses anything better than SMS. I don't need SMS 2FA, I use the longest password allowed by any service I use, randomly generated, saved to a password manager. These entities implement 2FA because their low hanging fruit customers (password reuse, easy to guess passwords, etc), not for real security. I keep badgering my bank to implement something better than SMS 2FA, I have FIDO U2F keys, passkeys, software authenticator, heck even email these days is better than SMS.
I use Bitwarden for my password manager. It supports passkeys, FIDO U2F, and is a software authenticator. Did I mention I use a 48 character randomly generated master password?
I know, I may seem to be a good target for the effort of cracking my accounts maintaining these high levels of security. I counter that by maintaining a low and even sometimes negative net worth and a poor credit rating.
This post has been deleted by its author
Probably points to lower credential stuffing protection on the platform.
If I had a list of millions of known usernames / email addresses / passwords that may have been re-used all over the place I'm going to test them against the platforms I can hit the quickest / easiest even if it's not one of the biggest platforms around.
Even if what is held on the platform turns out to be rubbish it gives me an extra data point against that email/username/password combination that confirms it is being reused across multiple platforms, at which point that becomes one to test as a higher priority against other platforms with more robust protection.