Newsletter Subject

Critical Security Notification - CodeShip Users

From

cloudbees.com

Email Address

cloudbees@cloudbees.com

Sent On

Wed, Sep 30, 2020 08:04 PM

Email Preheader Text

--------------------------------------------------------------- Dear CodeShip users, We are reaching

[CloudBees®]( --------------------------------------------------------------- Dear CodeShip users, We are reaching out to inform you of additional information we have uncovered as a result of our continuing investigation of the recent GitHub breach. To provide maximum transparency, we are reporting on the results of our investigation, the impact on users, actions you must take to protect yourself/your organization, and actions we will take to strengthen our security processes going forward. On Wednesday, September 16, 2020, CloudBees was notified by GitHub of suspicious activities targeting CodeShip business accounts connected to GitHub via the CodeShip GitHub app and now deprecated CodeShip OAuth tokens. CloudBees immediately initiated an investigation conducted by our security and engineering teams, and on September 27, we identified additional evidence of malicious activity against a failover CodeShip database. On September 29, we uncovered evidence to indicate that a malicious actor had access to this failover instance during the period of June 2019 to June 2020. At this time and to the best of our knowledge, we have no evidence of malicious activity or attempts within CodeShip systems since June 2020. What type of data was affected? The impacted accounts are those of CodeShip users. No other products or accounts were affected and CodeShip is in no way integrated with other CloudBees products or systems. For all CodeShip users: - CodeShip users hashed account passwords, one-time password (OTP) recovery codes and the OTP secret keys used to seed two-factor authentication may have been exposed. For CodeShip Basic users: - Any information contained in CodeShip users’ pipelines may have been exposed. This includes scripts, environment variables, access tokens and other similar data. For CodeShip Pro users: - AES encryption keys may have been exposed. Business contact information for invoicing purposes such as company contact name, company name, VAT number, postal address, phone number also may have been exposed. No payment information, such as bank account numbers or credit card numbers was exposed. No other CloudBees product other than CodeShip was impacted. Also, the logging system was not accessed for any customers. Steps you should take Although at this time we have no evidence that the data potentially exfiltrated has been used, all CodeShip users may have been affected (including free, Basic and Pro accounts) and should take the following steps: - Immediately rotate any keys or other secrets for cloud providers, third party tools or anything else that you used in your CodeShip pipelines. - If using CodeShip Pro, rotate your AES key and re-encrypt your secrets - Immediately identify any other sensitive information that is stored in your pipelines and replace them within your pipelines and on any external systems. - Determine whether any of your systems accessible from CodeShip have experienced unauthorized access, by contacting your provider or carefully review your access records. - Verify that the source code held in repositories that are linked to your CodeShip account have retained their full integrity. - [Reset your CodeShip 2FA](. At this time and to the best of our knowledge, we have no evidence of malicious activity or attempts within CodeShip systems since June 2020. We are continuing to monitor the situation. Steps we are taking As soon as we were notified by GitHub on September 16, we proceeded to rotate all our applications' internal secrets and rebuilt all our AWS AMIs. We are continuing to scrutinize our AWS security logs to monitor for suspicious activity, such as outbound connections to known malicious IPs. To date, we have not found any such activity. We want you to be assured that we are taking steps to increase the security strength of the CodeShip product, including but not limited to: - Validation that our product threat modeling and large-scope security reviews are systematically implemented. - Validation that the application of production security standards to all operational processes and artifacts is systematically implemented. - Enhancement of strict restrictions on access to production data and strict segregation of sensitive data. - Improvement of existing SIRT processes to ensure faster and better forensic investigation. Who to contact For more information, please [visit our CodeShip status page]( which we will continue to update with any new developments. If you still have questions, please contact [security@codeship.com](. Last but not least, I’d like to apologize for the impact this is having on you. In the decade that CloudBees has been operating SaaS applications, we have always taken full responsibility for our products and we do so today. Please be assured that we will do everything we can to prevent this from happening again. Onward, Sacha Labourey CEO CloudBees 4 N 2nd Street Suite 1270 San Jose, CA 95113 | [408-419-4300](=/lvRRD000K3Hp0U0nm0Q0q0E) © CloudBees, Inc. 2010-2020 [Privacy Policy]( | [Terms of Service]( | [Unsubscribe]( [fb]( [tw]( [in]( [g+](#) [yt](

Marketing emails from cloudbees.com

View More
Sent On

28/09/2021

Sent On

22/09/2021

Sent On

14/09/2021

Sent On

01/09/2021

Sent On

24/08/2021

Sent On

19/08/2021

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2025 SimilarMail.