Tuesday, May 13, 2025
HomeData BreachAccenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online Including...

Accenture Data Leak Exposed 137 Gigabytes of Highly Sensitive Data Online Including Master key

Published on

SIEM as a Service

Follow Us on Google News

One of the Worlds Largest Consulting FirmAccenture” Owned four Biggest cloud-based storage servers left Openly in Public without Securing Tons of Highly sensitive data that could be downloaded without a password by anyone who knew the servers web addresses.

Exposed Cloud Data servers belong to Accenture’s enterprise cloud offering, Accenture Cloud Platform, a “multi-cloud management platform” that is used for Accenture Customers.

These Unsecured Server Hosted on Amazon’s S3 storage service which is holding 137 gigabytes of Customer data has completely left unsecured which Could be affected tons Accenture Cloud Platform Customer Sensitive Data.

Publicly Downloadable  Accenture’s Unsecure Servers contains exposing secret API data, authentication credentials, certificates, decryption keys, customer information, and more data that could have been used to attack both Accenture and its clients.
- Advertisement - Google News
Also Read : Millions of PornHub Users Hijacked by ad Fraud Malware Infections

All 4 Unsure Server  Contains Sensitive Secret data about the Accenture Cloud Platform, its inner workings, and Accenture clients using the platform which maintains the “awsacp0175,”  as Account Name.

One of the Leaked Bucket Folder named as “Secure Store” Contains Completely Plain Text Document and Highly Sensitive master access key for Accenture’s account which Leads to allow an attacker full control over the company’s encrypted data stored on Amazon’s servers.

According to UpGuard Director of Cyber Risk Research Chris Vickery discovered four Amazon Web Services S3 storage buckets configured for public access, downloadable to anyone who entered the buckets’ web addresses into their internet browser.

Another Bucket Named as “client.jk” holding PlainText passwords and private signing keys were also exposed within these files.

One of 4 Bucket called  “acp-software Contains size of 137 GB largest Sensitive Data including Customers credentials, a collection of nearly 40,000 plaintext passwords and also email information.

Final Bucket  Named as “acp-ssl” Contains Key Stores to provide access to various Accenture environments, such as one titled “Cloud File Store Key,” among a number of private keys, as well as certificates.

“It is possible a malicious actor could have used the exposed keys to impersonate Accenture, dwelling silently within the company’s IT environment to gather more information. The specter of password reuse attacks also looms large, across multiple platforms, websites, and potentially hundreds of clients” UpGuard  Said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Lumma Stealer Upgraded with PowerShell Tools and Advanced Evasion Techniques

Sophos Managed Detection and Response (MDR) in September 2024, the notorious Lumma Stealer malware...

New Noodlophile Malware Spreads Through Fake AI Video Generation Platforms

Cybercriminals have unleashed a new malware campaign using fake AI video generation platforms as...

Kimsuky Hacker Group Deploys New Phishing Techniques and Malware Campaigns

The North Korean state-sponsored Advanced Persistent Threat (APT) group Kimsuky, also known as “Black...

APT37 Hackers Use Weaponized LNK Files and Dropbox for Command-and-Control Operations

The North Korean state-sponsored hacking group APT37, also known as ScarCruft, launched a spear...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cyberattackers Targeting IT Help Desks for Initial Breach

Cybercriminals are increasingly impersonating IT support personnel and trusted authorities to manipulate victims into...

Nomad Bridge Hacker Apprehended in Connection with $190 Million Heist

Alexander Gurevich, a 47-year-old dual Russian-Israeli citizen, was arrested last Thursday at Ben-Gurion Airport...

LockBit Ransomware Group Breached: Internal Chats and Data Leaked Online

The notorious LockBit ransomware group, once considered one of the world’s most prolific cyber...