Cloud

1/30/2019
05:29 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Rubrik Data Leak is Another Cloud Misconfiguration Horror Story

A server security mishap exposed vast stores of data belonging to clients of Rubrik, a security and cloud management firm.

Rubrik, an enterprise software company focused on cloud data management, has been exposing data related to major customers, due to a misconfigured AWS Elasticsearch server.

Security researcher Oliver Hough discovered the data, according to TechCrunch, which first reported the news. Rubrik was alerted to the issue on Jan. 29 and took the server offline. Because the server lacked password protection, anyone who knew its location could access it.

The exposed information reportedly dates back to Oct. 2018, timestamps indicate. Rubrik officials report that other than Hough, no external parties accessed the environment. However, the server was indexed on Shodan, a search engine for the exposed devices and databases.

Data leaks due to misconfigured servers are common and the industry has seen many in recent years. Yet it's ironic to see this happen at Rubrik, an enterprise company providing data services.

California-based Rubrik recently raised $261 million in Series E funding at a $3.3 billion valuation, Forbes reported earlier this month. This more than doubled its last raise in April 2017, when it was valued at $1.3 billion. It has thousands of major clients; among them the US Department of Defense, UK National Health Service and Homeland Security, Deloitte, and Shell.

Rubrik's full roster of corporate clients, and some federal government departments, was in the database. In a disclosure on the incident, cofounder and CTO Arvind Nithrakashyap says the data repository included customer names, business contact information, and support requests, in addition to customer support chats. He confirmed no customer-owned data was exposed.

"While building a new solution for customer support, a sandbox environment containing a subset of our customer corporate contact information and support interaction data was potentially accessible for a brief period of time," a Rubrik spokesperson said.

An investigation found that the cause was developer error, Nithrakashyap said. The sandbox development data repository defaulted to a lower security access level; Rubrik failed to follow its security procedure to correctly set the access control. It has since rectified the issue and rolled out multiple levels of approvals and security reviews to ensure it doesn’t happen again.

A Trend Poised to Continue

If it doesn't happen at Rubrik, it's likely to happen somewhere else, says Terry Ray, senior vice president and Imperva fellow, who predicted these incidents would continue. In the day since the Rubrik discovery went public, the State Bank of India was found to have made a similar error. An unprotected server left millions of customers' balances and transactions exposed.

"What we've seen — and continue to see — is companies are accelerating their use of technologies more than they're enabling their teams or hiring effective people," he says. This isn't a breach, he points out. It's a simple misconfiguration that should have been properly set.

This should be the first thing you do; an obvious step, says Ray. The first question admins should ask is "How am I preventing anybody else from connecting to this system?" Shodan scours the Web for public information, most of which tend to be Internet-accessible data lakes. The problem of misconfiguration is generally more common at large companies than smaller ones, where "everyone can look at everything." 

"The bigger the company, the harder it is to maintain process," Ray adds.

So why do these incidents keep happening? Part of the problem is the complexity of multi-cloud environments, says Ratinder Ahuja, cofounder and CEO at ShieldX. Businesses have traditionally depended on a set of boundary controls for data centers. Now they're embracing public and private clouds, making the boundary protecting their data increasingly more elastic.

"You need to have visibility inside these environments," he continues, and the key is understanding your risks and implementing controls to mitigate them. He recommends a layered approach: starting with a set of operating principles and backing them up with compensating controls in case they're not followed. In the Rubrik case, a database was created and customer information was stored, but no controls protected it from public access.

Without question, Ray says, the environments in which employees and admins operate is significantly more complex than it was five years ago. The evolution of IT is creating a high-risk environment for organizations with limited expertise on their tech staff, he notes.

Ray also points to a lack of education in organizations, where not everybody who works with data understands its value. When you're in a bank, you understand the value of cash when you see it. People who work with diamonds know value when they see it. But oftentimes it's hard to grasp the value of sensitive data or the consequences that could occur if it were exposed.

"[They] need education to understand the criticality of handling data," he says. Help employees understand where the data is and the type of data they're responsible for protecting.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Tips for the Aftermath of a Cyberattack
Kelly Sheridan, Staff Editor, Dark Reading,  4/17/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-0218
PUBLISHED: 2019-04-22
A vulnerability was discovered wherein a specially crafted URL could enable reflected XSS via JavaScript in the pony mail interface.
CVE-2019-11383
PUBLISHED: 2019-04-22
An issue was discovered in the Medha WiFi FTP Server application 1.8.3 for Android. An attacker can read the username/password of a valid user via /data/data/com.medhaapps.wififtpserver/shared_prefs/com.medhaapps.wififtpserver_preferences.xml
CVE-2019-11459
PUBLISHED: 2019-04-22
The tiff_document_render() and tiff_document_get_thumbnail() functions in the TIFF document backend in GNOME Evince through 3.32.0 did not handle errors from TIFFReadRGBAImageOriented(), leading to uninitialized memory use when processing certain TIFF image files.
CVE-2019-11460
PUBLISHED: 2019-04-22
An issue was discovered in GNOME gnome-desktop 3.26, 3.28, and 3.30 prior to 3.30.2.2, and 3.32 prior to 3.32.1.1. A compromised thumbnailer may escape the bubblewrap sandbox used to confine thumbnailers by using the TIOCSTI ioctl to push characters into the input buffer of the thumbnailer's control...
CVE-2019-8452
PUBLISHED: 2019-04-22
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains t...