Friday, June 14, 2024

1.5 Billion Files Exposed on Internet from Misconfigured FTP, SMB & S3 Buckets:12 Petabytes Publicly Available Sensitive data

More than 1.5 billion sensitive files exposed online publicly that including Patent Application, Payroll, Tax Return, Patient List, Copyright Application and Source Code.

The data exposed is not by means of any cybercriminal activities, it has been publicly available with the misconfigured cloud storage, file exchange protocols, and file sharing services

According to digital shadows report more than 1.5 billion sensitive files publically exposed across the three-month period. The exposed data is of 12,000 terabytes that available publicly on open Amazon S3 buckets, Rsync, SMB, FTP servers, misconfigured websites, and Network Attached Storage (NAS) drives.

1.5 billion sensitive files

With the data exposed Amazon S3 buckets accounts 7(percent), whereas other file sharing service like SMB (33 percent), rsync (28 percent) and FTP (26 percent) account larger portion of the exposure than the Amazon S3 buckets.

Also Read: Massive Cyber Attack Across the World Against ISP’s & Data Centres: More than 200,000 Cisco Switches Hacked

“The United States has the highest number of publicly-visible files shared across SMB, FTP, Web Index and NAS devices of any single country. With the 1.5 billion of sensitive files, 537 Million files are geolocated in the European Union,” said Digital Shadows.

1.5 billion sensitive files

“Digital Shadows analysis of these files indicates that organizations and individuals are unwittingly exposing vast volumes of data that aid attackers with a variety of motives, including espionage actors and financially-motivated actors criminals,”

Publicly exposed data contains a large amount of the employee data such as Payroll files (707,960) and Tax Return files (64,048). More than 2 Million of files that contain personal health information like MRIs based in Italy exposed.

The exposed data includes the Source Code, Patient List accounted about 95,434 and 4,548 respectively. Exposed data is a goldmine for attackers they can use the publicly available data to launch cyber attacks. the exposed information cut’s off their reconnaissance.

Shockingly some highly sensitive information’s such as security audit reports, network infrastructure details and penetration testing reports are stored online publicly.

Your data is a big part of your company. There are a hundred ways that to right away lose all of them which might get you out of business. There is a growing need to educate organizations and nd other people concerning the importance of securing sensitive data.

We heard about a number of Amazon bucket data exposures but the sensitive data exposed from other file exchange protocols and sharing services is greater than the S3 buckets.

GDPR comes into action on 25 May 2018 and it contains clear regulation on the protection of personal data and if the data is misgoverned companies should pay huge fines and damage in reputation.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles