Categories: Data Breach

Verizon Wireless Confidential Data Leaked Accidentally by Its Employee

Verizon Wireless Confidential Data Discovered from Publicly Access Amazon AWS S3  Bucket contains the  Confidential information About internal Verizon Wireless system.

The File Size of the Bucket Around 100 MB of Data that contains the information of  DVS (Distributed Vision Services).

Also Read:  Auto Tracking Company Sever Misconfiguration Leaks Over a Half Million Personal Records Online

According to Kromtech Security researchers,  DVS is the middleware and centralized environment for all of Verizon Wireless (the cellular arm of VZ) front-end applications, used to retrieve and update the billing data.

Discovered Repository files named as  “VZ Confidential” and “Verizon Confidential” which contains some sensitive information such as usernames, passwords.

These Credential information helps to easily allow access to other parts of Verizon’s internal network and infrastructure.

Publicly Access Repository contained information about,129 saved Outlook messages with access info and internal communications, B2B payment server names and info, Command notes, logs including, Admin user info that could potentially allow access to other parts of the network.

Further Analysed Conformed that this information about the  Verizon Wireless was self-owned by Verizon Wireless engineer and it did not belong or managed by Verizon.

According to Bob Diachenko, chief security communications officer, Kromtech“Our primary goal is to notify and secure the data not dispute if they are being honest or not. As more and more data leaks occur it makes consumers, and average individuals more vulnerable online.”

“We believe that companies have an obligation to not only take the proper security measures but also protect the data their employee collect and store”.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

3 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

4 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

4 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

4 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

4 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

17 hours ago