Friday, November 1, 2024
HomeData BreachAccenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online Including...

Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online Including Master key

Published on

Malware protection

One of the Worlds Largest Consulting FirmAccenture” Owned four Biggest cloud-based storage servers left Openly in Public without Securing Tons of Highly sensitive data that could be downloaded without a password by anyone who knew the servers web addresses.

Exposed Cloud Data servers belong to Accenture’s enterprise cloud offering, Accenture Cloud Platform, a “multi-cloud management platform” that is used for Accenture Customers.

These Unsecured Server Hosted on Amazon’s S3 storage service which is holding 137 gigabytes of Customer data has completely left unsecured which Could be affected tons Accenture Cloud Platform Customer Sensitive Data.

Publicly Downloadable  Accenture’s Unsecure Servers contains exposing secret API data, authentication credentials, certificates, decryption keys, customer information, and more data that could have been used to attack both Accenture and its clients.
- Advertisement - SIEM as a Service
Also Read : Millions of PornHub Users Hijacked by ad Fraud Malware Infections

All 4 Unsure Server  Contains Sensitive Secret data about the Accenture Cloud Platform, its inner workings, and Accenture clients using the platform which maintains the “awsacp0175,”  as Account Name.

One of the Leaked Bucket Folder named as “Secure Store” Contains Completely Plain Text Document and Highly Sensitive master access key for Accenture’s account which Leads to allow an attacker full control over the company’s encrypted data stored on Amazon’s servers.

According to UpGuard Director of Cyber Risk Research Chris Vickery discovered four Amazon Web Services S3 storage buckets configured for public access, downloadable to anyone who entered the buckets’ web addresses into their internet browser.

Another Bucket Named as “client.jk” holding PlainText passwords and private signing keys were also exposed within these files.

One of 4 Bucket called  “acp-software Contains size of 137 GB largest Sensitive Data including Customers credentials, a collection of nearly 40,000 plaintext passwords and also email information.

Final Bucket  Named as “acp-ssl” Contains Key Stores to provide access to various Accenture environments, such as one titled “Cloud File Store Key,” among a number of private keys, as well as certificates.

“It is possible a malicious actor could have used the exposed keys to impersonate Accenture, dwelling silently within the company’s IT environment to gather more information. The specter of password reuse attacks also looms large, across multiple platforms, websites, and potentially hundreds of clients” UpGuard  Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Grayscale Investments Data Breach Exposes 693K User Records Reportedly Affected

Grayscale Investments, a prominent crypto asset manager, has reportedly suffered a data breach affecting...

Northern Ireland Police to Pay £750,000 Fine Following Data Breach

The Police Service of Northern Ireland (PSNI) has been ordered to pay a £750,000...

Google Warns Of North Korean IT Workers Have Infiltrated The U.S. Workforce

North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue...