Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

9/5/2017
04:28 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Amazon S3 Bucket Leaks Expose Classified US Veteran Data

Improperly configured Amazon S3 buckets led to the exposure of data belonging to veterans with Top Secret security clearance and Time Warner Cable customers.

Thousands of Americans with classified security clearance had their personal information exposed over the weekend by a misconfigured Amazon server. Around the same time, another unsecured Amazon server exposed the data of millions of Time Warner Cable (TWC) customers.

Files exposing employees with security clearance, in some cases Top Secret, were traced back to private securirty firm TigerSwan. TigerSwan put the blame on TalentPen, a third-party vendor used to handle new job applicants, for not properly securing thousands of workers' sensitive data.

The collection of 9,402 documents, most of them resumes and applications to work for TigerSwan, was discovered by UpGuard Director of Cyber Risk Research Chris Vickery. The files were stored in an Amazon S3 bucket that lacked password protection.

"The exposed documents belong almost exclusively to US military veterans, providing a high level of detail about their past duties, including elite or sensitive defense and intelligence roles," explains UpGuard in a report on the discovery. Its Cyber Risk Team informed TigerSwan of the exposure on July 24, 2017; the files were left unsecured until August 24.

The files contained sensitive information including security clearances, driver's license numbers, passport numbers, at least partial Social Security Numbers. Some documents were resumes from Iraqi and Afghan nationals who worked with US forces and government agencies in their home countries and could be in danger if their personal information was exposed.

The work histories exposed in the leak include defense, intelligence, law enforcement, linguistic, and logistical experts who worked for the United Nations, US Secret Service, the Defense Intelligence Agency, Department of Defense, and the Department of Homeland Security.

"The potential damage from the TalentPen data leak makes damage from the unauthorized access of accounts pale in comparison," says Brad Keller, senior director of third-party strategy at Prevalent. "This disclosure could be extremely damaging to the individuals involved and highlights the very real need to fully assess your third parties."

TigerSwan, which stopped working with TalentPen in 2017, does not assume any of the burden.

"At no time was there ever a data breach of any TigerSwan server," the company reports in a blog post. "All resume files in TigerSwan’s possession are secure. We take seriously the failure of TalentPen to ensure the security of this information and regret any inconvenience or exposure our former recruiting vendor may have caused these applicants."

However, some experts put equal blame on both TigerSwan and TalentPen for failing to take proper precautions.

"TigerSwan is as much at fault here as TalentPen," notes Keller. "They chose to outsource this service and are accountable for TalentPen's failures … what where they doing to make sure TalentPen had adequate security controls and operational procedures in place?"

Around the same time, MacKeeper's Kromtech Security Center separately discovered software and service provider BroadSoft had been keeping records for more than four million TWC customers on Amazon servers without a password. Experts note AWS buckets are protected by default and the data was left publicly available by engineers who forgot to close the configuration.

The most damaging information exposed included internal development data like SQL database dumps, access logs, and code with access credentials. The two repositories also contained records and reports for Broadsoft clients using apps including Phone 2 Go and the TWC app.

"The only way for this to stop happening is for large organizations to gain a real-time understanding of which third parties have weak security controls in place so that they can work together to mitigate potential vulnerabilities before they’re exploited," says Fred Kneip, CEO of CyberGRX.

UpGuard emphasizes the urgent responsibility for businesses to protect their data from exposure caused by misconfiguration.

"Such cloud leaks can be as damaging as any hack, without the benefit of an external culprit for whom blame can be apportioned; the leak is the result of internal process failures that allow sensitive data to be exposed," the company says.

Amazon recently released a tool called Macie designed to identify, classify, and protect data in S3 storage. Leaks have become more prevalent as businesses move their data to the cloud. The service goes through data stored in S3, gives each data object a business value, and watches for suspicious activity.

"Macie's DLP capabilities for S3 buckets could have helped identify sensitive PII such as email addresses and Social Security numbers," explains RedLock cofounder and CEO Varun Badhwar. "However, the challenge for large organizations like Time Warner is that they have hundreds of S3 buckets across dozens of cloud environments, and very little context that can help them prioritize and remediate alerts from siloed security solutions, such as Amazon Macie."

Related Content:

Learn from the industry’s most knowledgeable CISOs and IT security experts in a setting that is conducive to interaction and conversation. Click for more info and to register.</p

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
menuisier69
50%
50%
menuisier69,
User Rank: Apprentice
9/6/2017 | 5:16:54 AM
Amazon S3 Bucket Leaks Expose Classified US Veteran Data
Shame on them ! Anyway, Amazon wil grow more and more day after day
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18214
PUBLISHED: 2019-10-19
The Video_Converter app 0.1.0 for Nextcloud allows denial of service (CPU and memory consumption) via multiple concurrent conversions because many FFmpeg processes may be running at once. (The workload is not queued for serial execution.)
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...