One of the Worlds Largest Consulting Firm “Accenture” Owned four Biggest cloud-based storage servers left Openly in Public without Securing Tons of Highly sensitive data that could be downloaded without a password by anyone who knew the servers web addresses.
Exposed Cloud Data servers belong to Accenture’s enterprise cloud offering, Accenture Cloud Platform, a “multi-cloud management platform” that is used for Accenture Customers.
These Unsecured Server Hosted on Amazon’s S3 storage service which is holding 137 gigabytes of Customer data has completely left unsecured which Could be affected tons Accenture Cloud Platform Customer Sensitive Data.
Publicly Downloadable Accenture’s Unsecure Servers contains exposing secret API data, authentication credentials, certificates, decryption keys, customer information, and more data that could have been used to attack both Accenture and its clients.
All 4 Unsure Server Contains Sensitive Secret data about the Accenture Cloud Platform, its inner workings, and Accenture clients using the platform which maintains the “awsacp0175,” as Account Name.
One of the Leaked Bucket Folder named as “Secure Store” Contains Completely Plain Text Document and Highly Sensitive master access key for Accenture’s account which Leads to allow an attacker full control over the company’s encrypted data stored on Amazon’s servers.
According to UpGuard Director of Cyber Risk Research Chris Vickery discovered four Amazon Web Services S3 storage buckets configured for public access, downloadable to anyone who entered the buckets’ web addresses into their internet browser.
Another Bucket Named as “client.jk” holding PlainText passwords and private signing keys were also exposed within these files.
One of 4 Bucket called ““acp-software“ Contains size of 137 GB largest Sensitive Data including Customers credentials, a collection of nearly 40,000 plaintext passwords and also email information.
Final Bucket Named as “acp-ssl” Contains Key Stores to provide access to various Accenture environments, such as one titled “Cloud File Store Key,” among a number of private keys, as well as certificates.
“It is possible a malicious actor could have used the exposed keys to impersonate Accenture, dwelling silently within the company’s IT environment to gather more information. The specter of password reuse attacks also looms large, across multiple platforms, websites, and potentially hundreds of clients” UpGuard Said.
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
Microsoft has swiftly addressed a critical security vulnerability affecting Windows 11 (version 23H2), which...
API Security Webinar
72 Hours to Audit-Ready API Security
APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.
Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.
Discussion points
API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.