Data integration and big data management firm Attunity exposed a significant amount of sensitive data through unprotected Amazon S3 buckets.
The company, owned by
The data leak was discovered on May 13 by a researcher at cyber resilience company
The buckets contained a vast amount of data, the expert downloaded a terabyte for analysis. The huge trove of data contained email backups, business documents, and employee
UpGuard shared as proof of the leak a Netflix database authentication strings, an invoice for a TD Bank software update, and slides describing a project for Ford.
Researchers also found credentials for Attunity systems and its official Twitter account, and an employee personal information (names, salary, date of birth, and employee ID numbers).
Some of the files are dated back September 2014, while other documents were uploaded a few days prior to the expert at UpGuard’s discovery the AWS buckers. at the time of writing its unclear how long data remained exposed online. UpGuard reported its discovery to Attunity on May 16, and the company quickly secured the buckets.
“The chain of events leading to the exposure of that data provides a useful lesson in the ecology of a data leak scenario. Users’ workstations may be secured against attackers breaking in, but other IT processes can copy and expose the same data valued by attackers.” concludes the company. “When such backups are exposed, they can contain a variety of data from system credentials to personally identifiable information. Data is not safe if misconfigurations and process errors expose that data to the public internet.”
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.