Security

California-based workforce platform Prosperix leaks drivers licenses and medical records

Prosperix leaked nearly 250,000 files. The breach exposed job seekers’ sensitive data, including home addresses and phone numbers.

Prosperix, formally Crowdstaffing, calls itself a “workforce innovation” company that develops software solutions for businesses to build an “extraordinary” workforce. It lists KPMG, Walmart, NBCUniversal and Avon among brands that trust the company.

On May 1st, the Cybernews research team discovered a misconfigured Amazon AWS bucket. The misconfiguration led to the exposure of approximately 250,000 files. 42,000 of them contained the sensitive data of job seekers, namely:

  • Full names
  • Dates of birth
  • Occupation history
  • Home addresses
  • Phone numbers
  • Email addresses

According to the researchers, most of these files were employment authorization documents, driving licenses, resumes, filled job application forms, diploma certificates and transcripts. Some of them were medical records – including urine tests and vaccination records.

The issue was quickly solved by the company. Cybernews reached out for an official comment but has yet to receive a reply.

The potential risks

A data leak like this can have many negative consequences for both the company and the affected job seekers.

“Individuals’ personal information (PII) such as full names, dates of birth, emails, phone numbers, and home addresses can be exploited for identity theft, spear phishing attacks, and other sorts of fraud,” our researchers warned.

For example, fraudsters could abuse such data to launch sham recruiting agencies. “This would be rather easy as fraudsters would already possess enough information about the potential victims to make their targeted scam look like appealing employment opportunities.”

Most of the employment authorization documents and driving licenses that were exposed appear to be expired. However, the leaky bucket dates back to 2017.

“Its exposure could presumably mean that those documents have been accessible for a considerable amount of time,” researchers warned.

Prosperix should focus on the following areas to mitigate risks:

  • Encryption: setting default server-side encryption for existing Amazon S3 buckets.
  • Auditing and logging: regularly checking server access logs
  • Employee training: enhancing knowledge and awareness of data security.

This isn’t the first time the Cybernews research team has stumbled upon exposed job seeker data. Last year, international job search engine Jooble.org put itself and its clients at risk by leaving a 470GB database unprotected.

The lion’s share of the database was composed of different job postings and searchers for companies. Our findings also indicated that Eastern European job seekers were at risk because the leaked data contained their personal information.

Leaks like this put job seekers at risk, so they should educate themselves on how to spot common job search-related scam techniques.

“For example, criminals tend to ask for money, financial information, or detailed personal information early in the application process. They also suggest conducting interviews through social media chats, set up fake company names with little to no social media presence, and offer salaries that are suspiciously high for the role,” they said.

Job seekers should do their homework by attentively looking into the company’s history and online presence. It’s also a good idea to contact the company through official channels.

Are you a job seeker? Suggestions for you are available in the original post at CyberNews:

https://cybernews.com/security/prosperix-leaks-drivers-licenses-medical-records/

About the author: Jurgita Lapienytė, Chief Editor at CyberNews

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, SpinOk)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

3 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

4 hours ago

Google fixed critical Chrome vulnerability CVE-2024-4058

Google addressed a critical Chrome vulnerability, tracked as CVE-2024-4058, that resides in the ANGLE graphics…

9 hours ago

Nation-state actors exploited two zero-days in ASA and FTD firewalls to breach government networks

Nation-state actor UAT4356 has been exploiting two zero-days in ASA and FTD firewalls since November…

20 hours ago

Hackers hijacked the eScan Antivirus update mechanism in malware campaign

A malware campaign has been exploiting the updating mechanism of the eScan antivirus to distribute…

1 day ago

US offers a $10 million reward for information on four Iranian nationals

The Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned four Iranian nationals for their…

1 day ago

This website uses cookies.