"it has a global user base of more than 200,000 organizations, with more than 5,000 paying customers"
1 in 40 customers pay. That doesn't sound like a decent value prop. for the 5000. ... blah blah blah, ... nation state ... rotate API keys ... usual wankery ... jolly sophisticated ... your data is important to us ... free credit scoring or something for all directors of the company. Soz, lol, weez so edgy ... Texan two step liability divestment ... fuck you!
Dreadfully sorry: Nurse, NUUUURSE my dried frog pills have started dancing around my head
I suspect that JumpCloud were doing the usual "move fast and break things" style of development and forgot to have a proper security team on hand. It is easy to forget to invest in an expensive nicety that costs money. I suspect that should they have managed unicorn or whatever status floated their boats then a few inconvenient gaps would have been coloured in. The language of the "apology" says otherwise but I call bull ...
The cool kids in IT always do this and sometimes it works but mostly it doesn't. I'd love to read their IRP and if the threat was considered sophisticated, that generally implies that you are unsophisticated.
It was a phishing thing and probably went like this: OK *click*. Windows updates not applied for six months, AV a couple of months behind due to a DNS misconfig by a well meaning techie trying to fix a weird wifi issue or the AV license running out. emails from AV vendor to an unwatched mailbox (they left a month ago). Audits on hold for a while due to temporary overtime ban .
"Continued analysis uncovered the attack vector" - this means we worked out who clicked on something they shouldn't. The pseudo military language is wankery.