Original post @ https://cybernews.com/security/french-pharmaceuticals-distribution-platform-leaking-1-7-tb-confidential-data/
The CyberNews investigation team discovered an unsecured, publicly accessible Kibana dashboard of an ElasticSearch database containing confidential data belonging to Apodis Pharma, a software company based in France.
Apodis Pharma is a company that offers a digital supply chain management platform and other software solutions created for pharmacies, healthcare institutions, pharmaceutical laboratories, and health insurance companies.
The database discovered by CyberNews contains over 1.7 TB of confidential business-related data, including pharmaceutical sales data, full names of Apodis Pharma partners and employees, client warehouse stock statistics, pharmaceutical shipment locations and addresses, and more.
On November 17, Apodis Pharma closed the database – it is no longer accessible to the public.
The unsecured Apodis Pharma ElasticSearch database contains seven unique indexes, which include the following:
Storing confidential client and patient data on a publicly accessible server without any kind of authentication process in place is highly dangerous, especially for organizations related to pharmaceuticals – during a worldwide pandemic.
At the time of writing this report, it is still unclear who had access to the publicly available Apodis Pharma database.
However, the database has already been indexed on at least one popular IoT search engine, which means that there is almost no doubt that the data has been accessed and possibly downloaded by outside parties for potentially malicious purposes.
Malicious actors with unauthorized access to this database could cause a lot of damage not only to the clients of Apodis Pharma, but also to untold numbers of unsuspecting patients across France.
“Unfortunately, server-side data leaks like this are still common these days. While some companies might think that leaving their Kibana dashboards accessible to the public is no big deal, 1.7TB of information is a very tempting target for cybercriminals. Malicious actors will jump at the opportunity to either steal or ransom such a massive amount of company data. After noticing one misconfiguration, they can then begin to probe the rest of the company’s defenses, looking for other, even more lucrative blind spots, which might result in far more damage than the initial leak. This is why all organizations – from small businesses to the largest multinationals – should make sure to shore up their cyber defenses before it’s too late.” said CyberNews.com Senior Writer & Researcher Edvardas Mikalauskas.
Following our vulnerability disclosure guidelines, we notified Apodis Pharma about the misconfiguration on October 22. However, we received no reply. Our follow-up communications were left unanswered as well. We then reached out to CERT France on October 29 in order to help secure the database. CERT contacted Apodis Pharma and informed the company about the misconfiguration.
However, more than two weeks later, the database was still publicly accessible. For this reason, we reached out directly to Apodis Pharma CTO Mathieu Bolard on November 16, who had the issue fixed the following day.
About the Author: Edvardas Mikalauskas
Edvardas is a Senior Writer and Researcher at CyberNews.
He writes about cybersecurity, privacy, and the impact of technology on the daily lives of consumers. He has a background in media, advertising, social, privacy, and security.
On CyberNews, Edvardas tends to focus on the subjects of data privacy and cybersecurity. His investigative reports on major data leaks, security vulnerabilities, and the black markets of the dark web have been featured in Forbes, TechRadar, Reason, TechRepublic, SC Magazine, and more.
With eight years of experience writing articles for web startups and tech publications, his bylines can be seen on ReadWrite, DZone, Hacker Noon, Cybersec Asia and more.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Apodis Pharma)
[adrotate banner=”5″]
[adrotate banner=”13″]