Results

Third-Party Risk

Reclaim Control Over Shadow Third-Party Access

Astrix enhances your TPRM program with automated and continuous discovery of all the connected third-party apps and vendors, and helps you focus on the risks that matter most.

ACCORDING TO ASTRIX RESEARCH
Google Cloud (1)

90%

of the apps connected to Google Workspace environments are non-marketplace apps

20%

of vendors behind marketplace apps are untrustworthy

Access tokens were stolen from the most trusted app vendors

Consent fatigue

Consent fatigue

Employees unknowingly/carelessly consent to grant excessive permissions to unknown third-party app vendors.

Attackers exploit ungoverned NHIs

NHIs are a prime target

NHIs given to third-parties are over-permissive by nature, and often never-expire. This makes them a prime target for attackers.

Supply chain attacks through NHIs

Supply chain attacks through NHIs

Attackers managed to steal NHIs from trusted vendors (Okta, GitHub & Microsoft) to penetrate their customers’ environments.

THE PERFECT STORM

Non-Human Identities Are Under Attack

CircleCI
Silhouette of two figures before a blue cloud, symbolizing Atrix as the leading non-human identity security platform.
A blue and white email app icon displaying a stylized "E" on overlapping rectangles. Atrix is the leading NHI Security platform.
Astrix's logo features four squares—red, green, blue, yellow—symbolizing leadership in NHI management and security. Alt text: Atrix's four-color square logo on a white background represents its expertise in NHI Management and Security.
Astrix, the leader in NHI Security, showcases its distinctive orange cloud logo on a white backdrop inside a rounded square.
Astrix's logo features four squares—red, green, blue, yellow—symbolizing leadership in NHI management and security. Alt text: Atrix's four-color square logo on a white background represents its expertise in NHI Management and Security.
Image of a blue snowflake icon on a white square background. Astrix is the leading platform in NHI and service account security management.
Astrix: The leading NHI Security platform, securing non-human identities through robust service account management. Alt text: A stylized "T" logo in white on a black background representing Atrix security.
A smiling yellow emoji with open hands conveys a welcoming gesture. Revised sentence: Atrix is the leading NHI Security platform, ensuring comprehensive NHI management and robust service account protection.
Astrix leads in NHI Security, optimizing service account security and enhancing non-human identity management. Alt Text: Black square logo featuring "JetBrains" in bold, white uppercase letters against a stark background.

CircleCI

Jan 2023

CircleCI experienced a breach where malware compromised an employee’s device, enabling attackers to steal session tokens and access customers’ sensitive data and encryption keys.

Slack

Jan 2023

Threat actors gained access to Slack’s externally hosted GitHub repositories via a “limited” number of stolen Slack employee tokens.

Jumpcloud

Jul 2023

During an ongoing investigation of a breach, Jumpcloud invalidated all API keys and later urged its customers to rotate all tokens provided.

Microsoft365

Jul 2023

Hackers stole an inactive signing key from a breached Azure system, used it to create valid email access tokens, and accessed Office365 accounts across multiple Azure AD cloud customers.

Microsoft

Sep 2023

A published SAS token by Microsoft’s AI researchers exposed 38TB of sensitive data for over 2 years.

GitHub Dependabot

Sep 2023

Hackers stole GitHub Personal Access Tokens and used them to make unauthorized commits as Dependabot to various repositories.

Okta

Oct 2023

Attackers used a leaked service account to access Okta’s support case management system, viewing files from recent customer support cases.

Cloudflare

Nov 2023

Hackers breached Cloudflare’s Atlassian suite via an unrotated token and service account credentials, despite Cloudflare rotating 5000 credentials after the Okta breach.

Microsoft

Jan 2024

Russian state-sponsored hackers abused OAuth applications to breach Microsoft’s Office 365 email server, exposing internal email correspondences.

Dropbox Sign

May 2024

Threat actors stole customer data, including API keys and OAuth tokens. Dropbox recommended rotating these keys and tokens for Google Workspace, Office 365, and Salesforce.

Snowflake

May 2024

Hundreds of Snowflake instances were breached by the financially motivated threat actor UNC5537, affecting approximately 165 organizations.

New York Times

Jun 2024

Attackers stole the New York Times’ source code by exploiting an over-privileged GitHub token, granting access to all repositories.

HuggingFace

Jun 2024

HuggingFace reported an unauthorized access to their servers, resulting in the theft of tokens and API keys from its Spaces platform.

JetBrains

Jun 2024

JetBrains found a vulnerability in their GitHub Plugin for IntelliJ IDEs, risking unauthorized access to GitHub repositories. They urged customers to revoke the plugin’s access by deleting PATs and OAuth app tokens.

GitHub

Jun 2024

The threat actor Gitloker exploited malicious OAuth apps to target GitHub users, causing significant data loss and ransom demands.

AWS

Aug 2024

Massive NHI Attack: Insecure AWS stored NHIs and machine credentials lead to compromise of 230 Million cloud environments.

BeyondTrust

Dec 2024

BeyondTrust suffered a breach via a zero-day vulnerability in a third-party app, exposing an AWS asset and compromising 17 customer SaaS instances.

Salesloft Drift

Aug 2025

Attackers compromised OAuth tokens for the Salesloft Drift third-party application, gaining widespread access to customer Salesforce instances and exfiltrating large volumes of data.

Existing solutions are not built for NHIs

Dark blue circuit board design symbolizes Atrix's lead in NHI security, with key and robot motifs on delicate lines.

Point-in-time assessment

TPRM tools assess third-party apps mainly during the procurement and pre-onboarding stages. Astrix continuously monitors everything that accesses your environment, how it behaves and the risk it poses.

Unaware of shadow apps

Ironically, apps that go through TPRM assessments are usually well-known SaaS apps with high-security standards. Astrix discovers all apps that access your environments, known or unknown, and analyzes their reputation in real time.

Obscure security scores

These scores are based on static parameters of the app vendor and lack real-time insights. We provide you with a continuous assessment of the vendor as well as your exposure in case this vendor gets breached. 

Slow questionnaires

Manual security questionnaires are not scalable and reduce agility. Astrix automatically provides all the necessary context about the third-party app and the vendor behind it, reducing overhead and increasing productivity.

Enhance your TPRM Program with Astrix

Continuous NHI discovery

Real-time discovery

Continuously inventory provisioned or in-use service accounts, secrets, OAuth apps, IAM roles, API keys and other NHIs. Complete the picture with the third-party vendors behind them, owners, and usage.

Holistic visibility across environments

Astrix inventories NHIs across IaaS, SaaS, PaaS and On-Prem – correlating your entire NHI connectivity to provide deeper context and better risk prioritization.

NHI types

Astrix secures all NHI types across environments, from OAuth apps and service accounts to certificates, roles and secrets.

NHI risk prioritization

Actionable risk scoring

Prioritize remediation efforts through rich context about services and resources an NHI can access (Google Drive, S3, Git repos, Slack channels), its permissions (full access, read, add), usage, and its consumers (internal users and third-party vendors)

Dynamic access analysis

Usage analysis and holistic visibility help you easily understand if an NHI is redundant (not in use), stale or over-privileged, what it’s connected to, and how to rotate or remove it without breaking anything.

Supply chain breach likelihood

Astrix’s likelihood engine rates third-party vendors according to their reputation, configuration, maintenance, and anomaly detection, highlighting the ones most likely to be breached.

App vetting

Vet before approving

Evaluate potential risks associated with third-party apps before authorizing their access. Detect risky permissions, untrustworthy vendors and malicious apps.

Vendor & app reputation

Discover the app’s actual vendor and understand its reputation based on different parameters such as company size, compliance status, posture, and data sovereignty.

Quick remediation

End-user communication & remediation

Remediate faster with end-user feedback and self-remediation. Automatically gather business justification from users behind NHIs and allow them to remove risky access themselves, without interfering with business processes.

Out-of-the-box remediation

Remediate with a click of a button using out-of-the-box policies for posture and incidents. Easily build custom workflows to fit your security needs.

Enterprise integrations

Integrate Astrix with your existing security stack to reduce overhead. Use Slack notifications, automatically open Jira tickets, use API automations, or work with your ITSM, SIEM and SOAR systems.

Learn more

Part 3: The anatomy of supply chain attacks: Non-human identities & TPRM failure

The Okta breach: The results of a leaked service account

Not just code vulnerabilities: The overlooked cause of software supply chain attacks

Ready to see Astrix in action?

See how Astrix can help you discover and remediate NHI risks across your environments.