{"id":182,"date":"2020-08-09T00:09:15","date_gmt":"2020-08-08T21:09:15","guid":{"rendered":"https:\/\/fierceonlinevideo.com\/?p=182"},"modified":"2020-10-27T03:23:59","modified_gmt":"2020-10-27T01:23:59","slug":"cyber-%e2%80%8b%e2%80%8bsecurity-company-information-revealed-among-other-things","status":"publish","type":"post","link":"https:\/\/fierceonlinevideo.com\/security\/cyber-%e2%80%8b%e2%80%8bsecurity-company-information-revealed-among-other-things\/","title":{"rendered":"Cyber \u200b\u200bsecurity company information revealed among other things"},"content":{"rendered":"
\n

VpnMentor’s cybersecurity research team led by Noam Rotem and Ran Locar has revealed unprotected AWS S3 container with over 5.5 million files and over 343GB in size <\/strong>it is not required.<\/p>\n

<\/span>Discovery timeline and owner reaction<\/h2>\n

Sometimes the extent of data breaches and the owner of the data are obvious, and the problem was resolved quickly. But these times are rare. Most of the time, we need days of investigation before we understand what is at stake or who is disclosing the information.<\/strong><\/p>\n

Understanding the violation and its potential impact takes careful attention and time. We work hard to publish accurate and reliable reports, making sure everyone who reads them understands their seriousness.<\/p>\n

Some parties dispute the facts, ignore our research, or diminish its impact.<\/strong> So we need to be thorough and make sure everything we find is right and true.<\/p>\n

In this case, after a few days of research, we recognized the possibility that the information belongs to InMotionNow and contacted the company later with our discovery<\/strong>. Although the unprotected S3 bucket is now closed, none of the company ever responded to attempts to gain access, so we cannot confirm ownership.<\/p>\n

    \n
  • Discovery date:<\/strong> December 20, 2019<\/li>\n
  • Date InMotionNow (alleged owner of the data) reported:<\/strong> December 26, 2019<\/li>\n
  • Date Amazon announced:<\/strong> 29 December 2019, 7 January 2020 and 30 January 2020<\/li>\n
  • Date bucket closed:<\/strong> February 17, 2020<\/li>\n
  • Date of notification of other companies:<\/strong> March 16, 2020<\/li>\n<\/ul>\n

    <\/span>Company profiles<\/h2>\n

    In this particular case, our research team was unable to verify without a shadow of a doubt who exactly owns the disclosed information. For this reason, we have decided that it is very important to let the general public know whose information and which information is vulnerable to the lack of standard cybersecurity procedures. <\/strong><\/p>\n

    Our research led us to it InMotionNow owns the data. We addressed them, and no one answered<\/strong>, and the bare bucket had no clear indication that it was theirs. With that in mind, we are including all companies whose information was found in the bucket<\/strong>. If it actually belongs to InMotionNow, they know who is disclosing the information, and if not, companies can investigate for themselves. Our team has also reached these companies on March 16, 2020.<\/strong><\/p>\n

    Founded in 1999, InMotionNow is a project management software company headquartered near Raleigh, North Carolina. They have FDA-compliant safety standards aimed at the verticals of their target customers.<\/p>\n

    Here is a non-exhaustive list of companies whose marketing material was found in an unprotected S3 bucket:<\/p>\n

    Cyber \u200b\u200bsecurity company ISC2.org<\/strong> several pieces of information were also included in this violation.<\/p>\n

    Brotherhood Mutual Insurance Company,<\/strong> which primarily serves religious institutions throughout the United States.<\/p>\n

    Universities such as the state of Kent in Ohio and Purdue in Indiana<\/strong>, The S3 group also contained numerous files and data.<\/p>\n

    Potawatomi Hotel & Casino<\/strong> in Milwaukee, Wisconsin.<\/p>\n

    Consumer Electronics Company, Zagg (ZAGG),<\/strong> which designs and produces mobile accessories.<\/p>\n

    A non-profit organization, the Freedom Forum Institute,<\/strong> which supports the United States \u2019First Amendment freedoms for all.<\/p>\n

    Organizations were found to be affected by different health care regulations. They include, but are not limited to:<\/p>\n

    Myriad genetics (MYGN)<\/strong> – Genetic and disease testing company.<\/p>\n

    Performance health<\/strong> – Provider of physiotherapy equipment and supplies.<\/p>\n

    <\/span>Examples of records<\/h2>\n

    Here is a list of information that our research team found and was able to identify:<\/p>\n

    The data is affected<\/h3>\n
      \n
    • Analytics reports<\/li>\n
    • Internal presentations, including:\n
        \n
      • Company strategy<\/li>\n
      • Annual revenue figures<\/li>\n
      • Number of existing customers<\/li>\n<\/ul>\n<\/li>\n
      • Training materials<\/li>\n
      • Internal customer requests, including:\n
          \n
        • Name of the applicant<\/li>\n
        • Project name and details<\/li>\n<\/ul>\n<\/li>\n
        • Marketing strategies and collateral<\/li>\n
        • Product labels<\/li>\n
        • Business intelligence<\/li>\n
        • Mailing lists with relevant personal information<\/li>\n<\/ul>\n

          Lists of university donors, including:<\/p>\n

            \n
          • Full names<\/li>\n
          • Personal and work messages<\/li>\n
          • Direct telephone numbers<\/li>\n
          • Credentials (degree, school, year)<\/li>\n
          • Amount donated<\/li>\n<\/ul>\n
            \n

            \"\"<\/span>

            List of university donors<\/p>\n<\/div>\n

            Countries affected<\/h3>\n

            These are the countries where we found customers who were included in the data breach, but we didn’t open every file, and it’s possible that there are more customers in other countries<\/strong> affected.<\/p>\n

              \n
            • France<\/li>\n
            • United States<\/li>\n<\/ul>\n

              <\/span>Impact of data breaches<\/h2>\n

              Confidential information<\/h3>\n

              Products covered by this data breach often contain private and \/ or confidential information<\/strong>. Promises of secure facilities and systems are key to customers, such as the military and its supply chain – and breaking this guarantee is not only a failure of services, but also a potential security risk.<\/p>\n

              Identity theft<\/h3>\n

              Knowing an individual\u2019s full name, birthday, and yes, even a prison record can give criminals enough information to steal a person\u2019s identity.<\/p>\n

              Identity theft<\/strong> does not always mean that a thief claims to be a certain person in real life; it also gives them a chance engage in credit fraud, clear your bank account and cheat<\/strong> against the family, friends and other persons of the victim of identity theft.<\/p>\n

              Copyright Infringements<\/h3>\n

              Anyone with access to the myriad of copyrighted documents contained in this S3 bucket could easily download them free of charge for their content and also download them illegally<\/strong> torrent network that is available to everyone for free.<\/p>\n

              Fraud<\/h3>\n

              The combination of brand materials and contact information makes it a thumb for anyone with harmful motives for fraud. It is possible give false testimony from universities and mark insider information to gain false credibility<\/strong>.<\/p>\n

              Corporate espionage<\/h3>\n

              Size unencrypted logins by administrators appear to be available for this violation<\/strong>. Loss of control of this access may result in cybercriminals taking over accounts<\/strong> and obtaining otherwise confidential information about stores, employees, and customers.<\/p>\n

              <\/span>Expert advice<\/h2>\n

              The company that owns this bucket could easily have avoided this data breach if it had taken some basic security measures to protect the S3 bucket. These include:<\/p>\n

                \n
              1. Protect your servers.<\/li>\n
              2. Implement the appropriate access rules.<\/li>\n
              3. Never leave a system that does not require authentication open on the Internet.<\/li>\n<\/ol>\n

                Every company can repeat the same steps regardless of size. For more information on protecting your business, visit our website a guide to protecting your website and online database<\/strong> from hackers.<\/p>\n

                Open the S3 bucket attachment<\/strong><\/h3>\n

                It\u2019s important to note that open, publicly viewable S3 buckets are not an AWS bug. They are usually the result of an error on the part of the bucket owner. Amazon provides detailed instructions for AWS users so they can protect their S3 buckets and keep them private.<\/p>\n

                For this unprotected S3 bucket, the quickest way to fix the error is:<\/p>\n

                  \n
                • Make the group private and add authentication protocols.<\/li>\n
                • Follow AWS access and authentication best practices.<\/li>\n
                • Add more layers of protection to the S3 bucket to further limit who can use it from each entry point.<\/li>\n<\/ul>\n

                  <\/span>For those affected by the data breach<\/h2>\n

                  If you suspect that you may have personal or business information about this unprotected S3 bucket – and are concerned about how this breach may affect you or other data breaches in general, read on. the complete guide to online privacy<\/strong> so that you can better protect your online future. It shows you how cybercriminals target Internet users, and the steps you can take to stay safe. <\/strong><\/p>\n

                  You can also hide part of the collected data using VPN<\/strong> the owner of this bucket. The VPN covers your IP address and country of residence, giving you an extra level of protection even if your information is revealed.<\/strong><\/p>\n

                  <\/span>How and why we discovered the violation<\/h2>\n

                  The VpnMentor research team found a misdefined bucket as part of a a huge web mapping project<\/strong>. Our researchers use port scanning to examine specific IP blocks and test open holes in systems for vulnerabilities. They examine each hole for data leaks.<\/p>\n

                  When they find a data breach, they use expert techniques to verify the identity of the owner of the S3 bucket<\/strong>. We will then notify the company of the violation. If possible, we will also notify those affected by the violation.<\/p>\n

                  We were able to use the S3 bucket because it was completely unprotected and unencrypted<\/strong>. Using a web browser, the team had access to all the files in the bucket.<\/p>\n

                  The purpose of this web mapping project is to make the Internet safer for all users. As ethical hackers, we have a duty to notify a company when we detect deficiencies in their network security<\/strong>.<\/p>\n

                  However, These ethics also mean that we also have a responsibility to the public<\/strong>. This is especially true when a company\u2019s data breach contains such a large amount of private and sensitive information.<\/p>\n

                  <\/span>About us and previous reports<\/h2>\n

                  vpnMentor is the world’s largest VPN verification site. The Research Lab is a pro bono service that aims to help the online community defend against cyber threats and train organizations on how to protect user data.<\/p>\n

                  In the past, we have detected a violation in LightInTheBox that compromised the information of its customers. We also recently revealed that a company owned by the largest hotel chain, AccorHotels, revealed more than 1 TB of guest information. You can also read our VPN leakage report and our privacy statistics report.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"

                  VpnMentor’s cybersecurity research team led by Noam Rotem and Ran Locar has revealed unprotected AWS S3 container with over 5.5 million files and over 343GB in size it is not required. Discovery timeline and owner reaction Sometimes the extent of data breaches and the owner of the data are obvious, and the problem was resolved […]<\/p>\n","protected":false},"author":2,"featured_media":183,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"wds_primary_category":6,"footnotes":""},"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts\/182"}],"collection":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/comments?post=182"}],"version-history":[{"count":1,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts\/182\/revisions"}],"predecessor-version":[{"id":450,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/posts\/182\/revisions\/450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/media\/183"}],"wp:attachment":[{"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/media?parent=182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/categories?post=182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fierceonlinevideo.com\/wp-json\/wp\/v2\/tags?post=182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}