Risk
7/9/2008
08:37 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

File Sharing Exposes Supreme Court Justice's Personal Information

An employee at an investment firm shared some files using LimeWire and exposed personal data associated with some 2,000 of the firm's clients, including Supreme Court Justice Stephen Breyer.

An employee at Wagner Resource Group, an investment firm in McLean, Va., decided to share some files using LimeWire late last year. In so doing, he managed to expose personal information associated with some 2,000 of the firm's clients, including Supreme Court Justice Stephen Breyer.

The Washington Post's Brian Krebs broke the story on Wednesday, thanks to a tip from a reader of the Post's online site. According to Krebs, the employee's carelessness exposed names, dates of birth, and Social Security numbers.

LimeWire is a peer-to-peer file sharing program that uses the Gnutella protocol. Like other file sharing applications, it allows users to make computer files available to other users of the software. Unfortunately, some users do not understand how to properly configure the software.

The LimeWire FAQs suggest that LimeWire, properly configured, doesn't present any special security risk. "As long as you don't share your entire hard drive, you shouldn't encounter any significant security risks using Gnutella," the FAQs explain. "However, make sure you are sharing only files you want to share, and to be completely safe, don't run executable programs that you obtain from the Gnutella network."

Of course, the use of any such software in environments where confidential information is stored represents a security risk. And misuse, deliberate or accidental, of file sharing programs isn't a new problem.

Last month, Walter Reed Army Medical Center said that officials were "investigating the possible disclosure of personal identifier information through unauthorized sharing of a data file containing the names of approximately one thousand Military Health System beneficiaries."

And last year, file sharing software installed on the laptop of a Pfizer employee led to a data breach that exposed names, Social Security numbers, and other information associated with about 17,000 Pfizer employees and past employees. In this case, it was not the employee who installed the software but her spouse.

A bill introduced late last year aims to impose security controls, file sharing restrictions among them, on federal systems. H.R. 4791, The Federal Agency Data Protection Act, passed the House in June and awaits action by the Senate. If passed by the Senate and signed into law, it would require government agency heads to "develop and implement a plan to ensure the security and privacy of information collected or maintained by or on behalf of the agency from the risks posed by certain peer-to-peer file sharing programs."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report