On Friday, September 5 at 23:33 UTC (16:33 PDT), one of our AWS accounts was accessed using a set of unauthorized keys. The intrusion was quickly detected, and the compromised keys were revoked within 30 minutes.
During this window, the attackers provisioned a large number of expensive compute resources for cryptocurrency mining, which in turn triggered AWS to lock the account.
Importantly, there was no unauthorized access to platform resources or customer data.
Our investigation determined the root cause: a misconfiguration in our JavaScript build process inadvertently exposed CI/CD environment variables. This led to the leak of a pipeline key, which the attackers exploited.
We immediately cleaned up all malicious resources and engaged with AWS in real time to fully restore account functionality.
Full traffic was restored at September 6, 7:07 UTC (12:07 am PDT)
Sep 06 2025 00:13 UTC: The outage started at as AWS locked down account
Sep 06 2025 00:18 UTC: AWS alerts HyperTrack engineering
Sep 06 2025 04:00 UTC:
Sep 06 2025 05:33 UTC:
Sep 06 2025 07:07 UTC:
Sep 06 2025 10:30 UTC:
Sep 06 2025 17:15 UTC:
Our team is conducting an in-depth analysis of the incident and is enhancing our security policies and procedures. These updates are designed to reinforce safeguards and ensure the continued safety of customer data.