A small number of Pantheon customer accounts were compromised through credential stuffing attacks using passwords stolen from external data breaches unrelated to Pantheon. The unauthorized access potentially allowed attackers to modify customer site code and files. Pantheon worked directly with affected customers to secure their accounts and remediate unauthorized changes, with no further suspicious activity detected after the 30-hour incident.
Trusted by 1,000+ teams
Stop finding out about outages from your users. Monitor 6,320+ cloud services and get alerted the second something breaks.
Final Update: We have concluded our investigation into the reports of unauthorized account access. Our team has worked directly with the small number of affected customers to secure their accounts and remediate any unauthorized changes.
Monitoring & Conclusion: We have seen no further evidence of unauthorized activity related to this incident. Our systems remain secure, and we continue to monitor for suspicious login patterns.
Ongoing Security Best Practices: While this incident is resolved, credential stuffing remains a common web-wide threat. To keep your account secure, we strongly recommend:
• Enabling MFA on all Pantheon user accounts.
• Using unique passwords managed via a password manager.
• Rotating secrets/keys if you suspect your local environment has been compromised.
Thank you for your patience as we worked to keep the Pantheon community secure.
We are currently investigating reports of unauthorized access to a small number of Pantheon customer accounts.
Our evidence suggests these accounts were accessed using credentials stolen from external third-party data breaches (unrelated to Pantheon). This technique, known as "credential stuffing," relies on reused passwords.
Required Actions for All Customers
• Audit Your Sites: Check for unexpected code or file modifications. If you find any suspicious changes, contact Pantheon Support immediately.
• Enable MFA (High Priority): Multi-factor authentication is your best defense against password theft.
• Enable MFA here: https://docs.pantheon.io/guides/account-mgmt/account/mfa
• Update Your Password: If you use your Pantheon password on any other site, change it immediately to a unique, strong passphrase.
Next Steps: We are continuing our investigation and will provide further updates as more information becomes available.
With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.
Start free trialNo credit card required · Cancel anytime · 6320 services available
Integrations with