Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Cloud Services Credentials Easily Stolen Via Google Code Search

Public cloud services are not safe for storing sensitive data, researchers say

The access codes and secret keys of thousands of public cloud services users can be easily found with a simple Google code search, a team of security researchers says.

Researchers at Stach & Liu, a security consulting firm that develops Google hacking tools, first revealed the results of their cloud services research (PDF) at the Hacker Halted conference last month in Miami. Now the team is offering one word of advice to companies that are considering storing critical information on the public cloud: Don't.

"It is not a good idea to put sensitive data out in the cloud right now -- at least not until there are intrusion-detection systems that would let users see these types of searches on their cloud services," says Fran Brown, managing director at Stach & Liu. "Companies are pushing forward on the cloud because they want the functionality, but they're not seeing the risk."

In an online demonstration, Brown showed how an attacker who knows Google and some simple facts about cloud services authentication can easily find the access codes, passwords, and secret keys needed to unlock data stored in public cloud services environments such as Amazon's EC3.

Such data is routinely stored by application developers and system administrators who don't know that their simple text files might be indexed by search engines and discoverable with a simple Google code search, Brown says.

"We found literally thousands of keys stored this way, any one of which could be used to take control of computers in the cloud, shut them down, or used to launch attacks on other computers on the same service," he states.

The problem, according to Stach & Liu, is not necessarily the service provider, but the developers and administrators who store their credentials carelessly in text files and applications code that might be exposed to the Web, particularly in Web-based cloud environments. "All you need is one careless developer who puts his credentials in a text file -- and you're hosed," Brown says.

Stach & Liu has developed a cloud-hacking tool -- another in its Diggity line of Google hacking tools, which were first unveiled at Black Hat USA in July -- that seeks out and finds exposed cloud credentials via a simple Google code search.

While cloud services authentication might require multiple pieces of information in order to gain access to stored data, Stach & Liu was frequently able to find all of the credentials required to access corporate data stored on the cloud, Brown says.

In many cases, cloud services agreements state specifically that the provider is not responsible for such credentials leaks, Brown observes. "If you look closely at the agreements, you'll see that the provider makes no guarantee that the data stored in the service will stay safe," he notes. "The security industry needs to broker a better deal with the Amazons and the other cloud service providers out there."

In its Hacker Halted presentation, Stach & Liu also presented several other Google hacking tools and vulnerabilities, including tools that identify malware as well as flaws in Flash and data leak prevention applications.

"Flash files are another easy attack," Brown says. "It's very easy to find login pages built on Flash, decompile the files, and look for vulnerabilities." In the demonstration, Brown was able to use Google search results to gain access to a Web-based account in less than 30 seconds.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/10/2012 | 7:06:21 AM
re: Cloud Services Credentials Easily Stolen Via Google Code Search
Almost all internet users use cloud services like backing up,AV update etc.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13523
PUBLISHED: 2020-08-04
An exploitable information disclosure vulnerability exists in SoftPerfect’s RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can cause the disclosure of sensitive information. An attacker can send a malicious IRP to trigger this vulnerability.
CVE-2020-16134
PUBLISHED: 2020-08-04
An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or r...
CVE-2020-16199
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read/modify information, execute arbitrary code, and/or crash the applicat...
CVE-2020-16201
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. Multiple out-of-bounds read vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to read information.
CVE-2020-16203
PUBLISHED: 2020-08-04
Delta Industrial Automation CNCSoft ScreenEditor, Versions 1.01.23 and prior. An uninitialized pointer may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash...