Monday, October 7, 2024
HomeSecurity News1.5 Billion Files Exposed on Internet from Misconfigured FTP, SMB & S3...

1.5 Billion Files Exposed on Internet from Misconfigured FTP, SMB & S3 Buckets:12 Petabytes Publicly Available Sensitive data

Published on

More than 1.5 billion sensitive files exposed online publicly that including Patent Application, Payroll, Tax Return, Patient List, Copyright Application and Source Code.

The data exposed is not by means of any cybercriminal activities, it has been publicly available with the misconfigured cloud storage, file exchange protocols, and file sharing services

According to digital shadows report more than 1.5 billion sensitive files publically exposed across the three-month period. The exposed data is of 12,000 terabytes that available publicly on open Amazon S3 buckets, Rsync, SMB, FTP servers, misconfigured websites, and Network Attached Storage (NAS) drives.

- Advertisement - EHA
1.5 billion sensitive files

With the data exposed Amazon S3 buckets accounts 7(percent), whereas other file sharing service like SMB (33 percent), rsync (28 percent) and FTP (26 percent) account larger portion of the exposure than the Amazon S3 buckets.

Also Read: Massive Cyber Attack Across the World Against ISP’s & Data Centres: More than 200,000 Cisco Switches Hacked

“The United States has the highest number of publicly-visible files shared across SMB, FTP, Web Index and NAS devices of any single country. With the 1.5 billion of sensitive files, 537 Million files are geolocated in the European Union,” said Digital Shadows.

1.5 billion sensitive files

“Digital Shadows analysis of these files indicates that organizations and individuals are unwittingly exposing vast volumes of data that aid attackers with a variety of motives, including espionage actors and financially-motivated actors criminals,”

Publicly exposed data contains a large amount of the employee data such as Payroll files (707,960) and Tax Return files (64,048). More than 2 Million of files that contain personal health information like MRIs based in Italy exposed.

The exposed data includes the Source Code, Patient List accounted about 95,434 and 4,548 respectively. Exposed data is a goldmine for attackers they can use the publicly available data to launch cyber attacks. the exposed information cut’s off their reconnaissance.

Shockingly some highly sensitive information’s such as security audit reports, network infrastructure details and penetration testing reports are stored online publicly.

Your data is a big part of your company. There are a hundred ways that to right away lose all of them which might get you out of business. There is a growing need to educate organizations and nd other people concerning the importance of securing sensitive data.

We heard about a number of Amazon bucket data exposures but the sensitive data exposed from other file exchange protocols and sharing services is greater than the S3 buckets.

GDPR comes into action on 25 May 2018 and it contains clear regulation on the protection of personal data and if the data is misgoverned companies should pay huge fines and damage in reputation.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hybrid Analysis Utilizes Criminal IP’s Robust Domain Data for Better Malware Detection

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA,...

RCE Vulnerability (CVE-2024-30052) Allow Attackers To Exploit Visual Studio via Dump Files

The researcher investigated the potential security risks associated with debugging dump files in Visual...

Cacti Network Monitoring Tool Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been identified in the Cacti network monitoring tool that...

Microsoft & DOJ Dismantles Hundreds of Websites Used by Russian Hackers

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...