Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

Cloud Services Credentials Easily Stolen Via Google Code Search

Public cloud services are not safe for storing sensitive data, researchers say

The access codes and secret keys of thousands of public cloud services users can be easily found with a simple Google code search, a team of security researchers says.

Researchers at Stach & Liu, a security consulting firm that develops Google hacking tools, first revealed the results of their cloud services research (PDF) at the Hacker Halted conference last month in Miami. Now the team is offering one word of advice to companies that are considering storing critical information on the public cloud: Don't.

"It is not a good idea to put sensitive data out in the cloud right now -- at least not until there are intrusion-detection systems that would let users see these types of searches on their cloud services," says Fran Brown, managing director at Stach & Liu. "Companies are pushing forward on the cloud because they want the functionality, but they're not seeing the risk."

In an online demonstration, Brown showed how an attacker who knows Google and some simple facts about cloud services authentication can easily find the access codes, passwords, and secret keys needed to unlock data stored in public cloud services environments such as Amazon's EC3.

Such data is routinely stored by application developers and system administrators who don't know that their simple text files might be indexed by search engines and discoverable with a simple Google code search, Brown says.

"We found literally thousands of keys stored this way, any one of which could be used to take control of computers in the cloud, shut them down, or used to launch attacks on other computers on the same service," he states.

The problem, according to Stach & Liu, is not necessarily the service provider, but the developers and administrators who store their credentials carelessly in text files and applications code that might be exposed to the Web, particularly in Web-based cloud environments. "All you need is one careless developer who puts his credentials in a text file -- and you're hosed," Brown says.

Stach & Liu has developed a cloud-hacking tool -- another in its Diggity line of Google hacking tools, which were first unveiled at Black Hat USA in July -- that seeks out and finds exposed cloud credentials via a simple Google code search.

While cloud services authentication might require multiple pieces of information in order to gain access to stored data, Stach & Liu was frequently able to find all of the credentials required to access corporate data stored on the cloud, Brown says.

In many cases, cloud services agreements state specifically that the provider is not responsible for such credentials leaks, Brown observes. "If you look closely at the agreements, you'll see that the provider makes no guarantee that the data stored in the service will stay safe," he notes. "The security industry needs to broker a better deal with the Amazons and the other cloud service providers out there."

In its Hacker Halted presentation, Stach & Liu also presented several other Google hacking tools and vulnerabilities, including tools that identify malware as well as flaws in Flash and data leak prevention applications.

"Flash files are another easy attack," Brown says. "It's very easy to find login pages built on Flash, decompile the files, and look for vulnerabilities." In the demonstration, Brown was able to use Google search results to gain access to a Web-based account in less than 30 seconds.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Georgeken
50%
50%
Georgeken,
User Rank: Apprentice
2/10/2012 | 7:06:21 AM
re: Cloud Services Credentials Easily Stolen Via Google Code Search
Almost all internet users use cloud services like backing up,AV update etc.
4 Tips to Run Fast in the Face of Digital Transformation
Shane Buckley, President & Chief Operating Officer, Gigamon,  12/9/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4245
PUBLISHED: 2019-12-11
Orca has arbitrary code execution due to insecure Python module load
CVE-2013-4593
PUBLISHED: 2019-12-11
RubyGem omniauth-facebook has an access token security vulnerability
CVE-2013-6495
PUBLISHED: 2019-12-11
JBossWeb Bayeux has reflected XSS
CVE-2013-7370
PUBLISHED: 2019-12-11
node-connect before 2.8.2 has cross site scripting in methodOverride Middleware
CVE-2019-18935
PUBLISHED: 2019-12-11
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote cod...