Check out our latest webinar on infostealers, session cookie theft, and session hijacking

Video

Demonstrating ghost logins in Snowflake and how to remediate them.

Ghost logins are additional login methods than can exist simultaneously to the preferred default login method (e.g. SSO). Ghost logins often lack robust authentication controls such as MFA, meaning that stolen credentials for local logins with a username and password will remain valid even if an SSO login also exists for that account. These accounts will lack MFA unless specifically adopted by the user.

This vulnerability affects the majority of SaaS apps, including Snowflake, which was recently subject to a massive malicious campaign in which accounts belonging to over 165 Snowflake customers have been compromised.

Luke Jennings, VP R&D at Push Security, demonstrates this vulnerability in Snowflake and what you can do about it.

The command run by Luke is:

SELECT
  NAME AS user_name,
  EMAIL AS email,
  DISABLED AS disabled,
  HAS_PASSWORD as has_password,
  EXT_AUTHN_DUO as mfa
FROM
  SNOWFLAKE.ACCOUNT_USAGE.USERS
WHERE
  DISABLED = false
  AND HAS_PASSWORD = true
  AND EXT_AUTHN_DUO = false

You can also check out the full webinar here.

Ready to take Push for a spin?
You've got 10 free licenses and nothing to lose

Similar content