Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

1/18/2019
08:15 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Exposed Oklahoma Server Shows On-Premises Data Is Vulnerable, Too

Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.

Over the last 12 months, dozens of security stories documented how easily data can leak when enterprises leave business and customer data unsecured in databased hosted by various public cloud services.

However, on-premises data is equally vulnerable to attackers who can sniff out poor security practices.

This week, security firm UpGuard released a report that detailed how a on-premises storage server belonging to the Oklahoma Department of Securities (ODS) had been left exposed to the public-facing Internet, leaving about 3TB of data and millions of files exposed to anyone who knew where to look for the IP address.

Specifically, the data was left exposed through an unsecured sync service belonging to an address registered to the Oklahoma Office of Management and Enterprise Services.

It's not clear if anyone ever found and downloaded the data, and the ODS responded quickly to the UpGuard researchers and closed off access to the server. However, the type of data this system contained could prove extremely valuable to someone looking to steal data.

The ODS is part of the state's Department of Securities, which functions much like the federal Securities and Exchange Commission. The department ensures that securities are being traded legally and it can conduct investigations into fraud and other consumer complaints.

(Source: iStock)
(Source: iStock)

This created a treasure-trove of data, some of it dating back to the mid-1980s, including details of FBI investigations. The last entry dated to 2016.

"In the course of our research we have developed a data taxonomy based on the types of entities affected by breaches. In this case we found examples of the many of the types of data that might be leaked in a breach," according to the January 16 report.

Among the 3TBs, researchers found:

  • A Microsoft Access database that contained information on approximately 10,000 brokers, including social security numbers
  • A CSV file that contained the date of birth, state of birth, country of birth, gender, height, weight, hair color and eye color for more than 1000,000 brokers
  • Finally, a database that contained viators -- a financial vehicle that allows terminally ill patients can sell their life insurance benefits -- which contained data on AIDS patients

What's particularly interesting is that researchers found the exposed government server using Shodan, a search engine for locating Internet-facing IP addresses. No complicated hacking tools were needed.

It's not clear how long the server was left exposed but the Shodan search engine noted it was first registered on November 30, 2018.

Incidents such as these show that no matter where data is stored -- public cloud, private data or a hybrid environment -- poor security practices often mean data is left exposed and can be found with relative ease. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)

Even something as basic as two-factor authentication could easily have cut down some of the risk in this week's case.

"This is just another example for the need to tightly control and maintain the cyber posture of all internet-facing servers, both on-prem and within the public cloud," Praveen Jain, the CTO of Cavirin, which provides security tools for hybrid cloud environments, noted in an email to Security Now.

"The solution combines training, better processes, as well as rigorous OS hardening, updates, and patching of vulnerabilities," Jain added. "And, as noted, tools like Shodan make it all too easy for hackers to scan the Internet for public servers and then probe for vulnerabilities. So, the issue will not go away any time soon."

These sentiments were echoed by Anurag Kahol, the CTO of security vendor Bitglass.

"While all organizations need to defend their data, government agencies, in particular, must adhere to the highest of security standards -- the type of information that they collect, store and share demands it," Kahol wrote in an email.

With the server, many of the files were back-ups, including for email files and virtual machines. While this type of back-up system is considered essential for recovering from a disaster or a ransomware attack, "the final crucial step is to maintain control over every copy of those data stores," the UpGuard report notes. (See Cloud Backup: How It Can Protect Against Ransomware.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-19949
PUBLISHED: 2021-09-23
A cross-site scripting (XSS) vulnerability in the /link/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.
CVE-2020-19950
PUBLISHED: 2021-09-23
A cross-site scripting (XSS) vulnerability in the /banner/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.
CVE-2020-19951
PUBLISHED: 2021-09-23
A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application.
CVE-2021-41088
PUBLISHED: 2021-09-23
Elvish is a programming language and interactive shell, combined into one package. In versions prior to 0.14.0 Elvish's web UI backend (started by `elvish -web`) hosts an endpoint that allows executing the code sent from the web UI. The backend does not check the origin of requests correctly. As a r...
CVE-2021-29813
PUBLISHED: 2021-09-23
IBM Jazz for Service Management 1.1.3.10 and IBM Tivoli Netcool/OMNIbus_GUI is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a t...