Data integration and big data management firm Attunity exposed a significant amount of sensitive data through unprotected Amazon S3 buckets.
The company, owned by
The data leak was discovered on May 13 by a researcher at cyber resilience company
The buckets contained a vast amount of data, the expert downloaded a terabyte for analysis. The huge trove of data contained email backups, business documents, and employee
UpGuard shared as proof of the leak a Netflix database authentication strings, an invoice for a TD Bank software update, and slides describing a project for Ford.
Researchers also found credentials for Attunity systems and its official Twitter account, and an employee personal information (names, salary, date of birth, and employee ID numbers).
Some of the files are dated back September 2014, while other documents were uploaded a few days prior to the expert at UpGuard’s discovery the AWS buckers. at the time of writing its unclear how long data remained exposed online. UpGuard reported its discovery to Attunity on May 16, and the company quickly secured the buckets.
“The chain of events leading to the exposure of that data provides a useful lesson in the ecology of a data leak scenario. Users’ workstations may be secured against attackers breaking in, but other IT processes can copy and expose the same data valued by attackers.” concludes the company. “When such backups are exposed, they can contain a variety of data from system credentials to personally identifiable information. Data is not safe if misconfigurations and process errors expose that data to the public internet.”