Cloud

9/5/2017
04:28 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Amazon S3 Bucket Leaks Expose Classified US Veteran Data

Improperly configured Amazon S3 buckets led to the exposure of data belonging to veterans with Top Secret security clearance and Time Warner Cable customers.

Thousands of Americans with classified security clearance had their personal information exposed over the weekend by a misconfigured Amazon server. Around the same time, another unsecured Amazon server exposed the data of millions of Time Warner Cable (TWC) customers.

Files exposing employees with security clearance, in some cases Top Secret, were traced back to private securirty firm TigerSwan. TigerSwan put the blame on TalentPen, a third-party vendor used to handle new job applicants, for not properly securing thousands of workers' sensitive data.

The collection of 9,402 documents, most of them resumes and applications to work for TigerSwan, was discovered by UpGuard Director of Cyber Risk Research Chris Vickery. The files were stored in an Amazon S3 bucket that lacked password protection.

"The exposed documents belong almost exclusively to US military veterans, providing a high level of detail about their past duties, including elite or sensitive defense and intelligence roles," explains UpGuard in a report on the discovery. Its Cyber Risk Team informed TigerSwan of the exposure on July 24, 2017; the files were left unsecured until August 24.

The files contained sensitive information including security clearances, driver's license numbers, passport numbers, at least partial Social Security Numbers. Some documents were resumes from Iraqi and Afghan nationals who worked with US forces and government agencies in their home countries and could be in danger if their personal information was exposed.

The work histories exposed in the leak include defense, intelligence, law enforcement, linguistic, and logistical experts who worked for the United Nations, US Secret Service, the Defense Intelligence Agency, Department of Defense, and the Department of Homeland Security.

"The potential damage from the TalentPen data leak makes damage from the unauthorized access of accounts pale in comparison," says Brad Keller, senior director of third-party strategy at Prevalent. "This disclosure could be extremely damaging to the individuals involved and highlights the very real need to fully assess your third parties."

TigerSwan, which stopped working with TalentPen in 2017, does not assume any of the burden.

"At no time was there ever a data breach of any TigerSwan server," the company reports in a blog post. "All resume files in TigerSwan’s possession are secure. We take seriously the failure of TalentPen to ensure the security of this information and regret any inconvenience or exposure our former recruiting vendor may have caused these applicants."

However, some experts put equal blame on both TigerSwan and TalentPen for failing to take proper precautions.

"TigerSwan is as much at fault here as TalentPen," notes Keller. "They chose to outsource this service and are accountable for TalentPen's failures … what where they doing to make sure TalentPen had adequate security controls and operational procedures in place?"

Around the same time, MacKeeper's Kromtech Security Center separately discovered software and service provider BroadSoft had been keeping records for more than four million TWC customers on Amazon servers without a password. Experts note AWS buckets are protected by default and the data was left publicly available by engineers who forgot to close the configuration.

The most damaging information exposed included internal development data like SQL database dumps, access logs, and code with access credentials. The two repositories also contained records and reports for Broadsoft clients using apps including Phone 2 Go and the TWC app.

"The only way for this to stop happening is for large organizations to gain a real-time understanding of which third parties have weak security controls in place so that they can work together to mitigate potential vulnerabilities before they’re exploited," says Fred Kneip, CEO of CyberGRX.

UpGuard emphasizes the urgent responsibility for businesses to protect their data from exposure caused by misconfiguration.

"Such cloud leaks can be as damaging as any hack, without the benefit of an external culprit for whom blame can be apportioned; the leak is the result of internal process failures that allow sensitive data to be exposed," the company says.

Amazon recently released a tool called Macie designed to identify, classify, and protect data in S3 storage. Leaks have become more prevalent as businesses move their data to the cloud. The service goes through data stored in S3, gives each data object a business value, and watches for suspicious activity.

"Macie's DLP capabilities for S3 buckets could have helped identify sensitive PII such as email addresses and Social Security numbers," explains RedLock cofounder and CEO Varun Badhwar. "However, the challenge for large organizations like Time Warner is that they have hundreds of S3 buckets across dozens of cloud environments, and very little context that can help them prioritize and remediate alerts from siloed security solutions, such as Amazon Macie."

Related Content:

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.</p

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
menuisier69
50%
50%
menuisier69,
User Rank: Apprentice
9/6/2017 | 5:16:54 AM
Amazon S3 Bucket Leaks Expose Classified US Veteran Data
Shame on them ! Anyway, Amazon wil grow more and more day after day
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
Why Enterprises Can't Ignore Third-Party IoT-Related Risks
Charlie Miller, Senior Vice President, The Santa Fe Group,  5/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Security through obscurity"
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11311
PUBLISHED: 2018-05-20
A hardcoded FTP username of myscada and password of Vikuk63 in 'myscadagate.exe' in mySCADA myPRO 7 allows remote attackers to access the FTP server on port 2121, and upload files or list directories, by entering these credentials.
CVE-2018-11319
PUBLISHED: 2018-05-20
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code execution via a malicious gcc plugin, if an attacker has write access to ...
CVE-2018-11242
PUBLISHED: 2018-05-20
An issue was discovered in the MakeMyTrip application 7.2.4 for Android. The databases (locally stored) are not encrypted and have cleartext that might lead to sensitive information disclosure, as demonstrated by data/com.makemytrip/databases and data/com.makemytrip/Cache SQLite database files.
CVE-2018-11315
PUBLISHED: 2018-05-20
The Local HTTP API in Radio Thermostat CT50 and CT80 1.04.84 and below products allows unauthorized access via a DNS rebinding attack. This can result in remote device temperature control, as demonstrated by a tstat t_heat request that accesses a device purchased in the Spring of 2018, and sets a ho...
CVE-2018-11239
PUBLISHED: 2018-05-19
An integer overflow in the _transfer function of a smart contract implementation for Hexagon (HXG), an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets by providing a _to argument in conjunction with a large _value argument, as exploited in the wild in ...