Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/24/2019
05:25 PM
50%
50%

First American Financial Corp. Left Mortgage Data Exposed on Website

Real estate title firm reportedly has closed a hole in its website that had left hundreds of millions of real estate tile insurance files accessible without authentication, according to KrebsOnSecurity.

The website of real estate title insurance company First American Financial Corp. left exposed bank account statements, mortgage and tax information, Social Security numbers, wire transaction receipts, and driver's license images, KrebsOnSecurity reported today.

Access to some 885 million mortgage-related files dating back to 2003 did not require authentication — a security hole first spotted by a real estate developer who alerted KrebsOnSecurity about the issue on firstam.com. The exposed website was disabled as of 2 p.m. ET today, according to KrebsOnSecurity.

First American sent this statement to the news site: "First American has learned of a design defect in an application that made possible unauthorized access to customer data. At First American, security, privacy and confidentiality are of the highest priority and we are committed to protecting our customers' information. The company took immediate action to address the situation and shut down external access to the application. We are currently evaluating what effect, if any, this had on the security of customer information. We will have no further comment until our internal review is completed."

Read more here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:32:04 AM
Re: Non denial denial
True companies have to careful but generally once the water breaks, baby is on the way out and saying possible birth is rather silly. Good point. Being realistic at least.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:30:49 AM
Re: Non denial denial
And yet there was just article here on corporate response a week or two ago and how it is poorly managed. Agree. PR is always the hardest part after the attack.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:29:14 AM
Re: Non denial denial
Admit nothing and deny everything right to the very end. I hear you. That is how everyone get into trouble in most cases.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:28:19 AM
Re: Non denial denial
How about HONESTY and say we were breached, access to data was public and here is we have done and will do to protect your data in case YOU were compromised. I hear you. Hard to get information out.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
5/29/2019 | 8:26:52 AM
Unthinkable
The website of real estate title insurance company First American Financial Corp. left exposed bank account statements, mortgage and tax information, Social Security numbers, wire transaction receipts, and driver's license images, KrebsOnSecurity reported today. When are these people learn? Are they not following news? Do not leave anything open out in the cloud.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/28/2019 | 1:18:13 PM
Re: Non denial denial
And yet there was just article here on corporate response a week or two ago and how it is poorly managed.  You can't have the cake and eat it too.   True companies have to careful but generally once the water breaks, baby is on the way out and saying possible birth is rather silly.  
lakers85
50%
50%
lakers85,
User Rank: Strategist
5/28/2019 | 11:53:36 AM
Re: Non denial denial
You can blame lawyers and our legal system (and that entails) for all of the 'alleged' instances of misconduct, malfeasance and other acts of impropriety. Admit nothing and deny everything right to the very end.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
5/28/2019 | 8:12:59 AM
Non denial denial
Possible access - gotta love use of the English language.  A broken window and door indicates it may be possible that a thief broke into my home.  Not probable, just possible.  As if that is kinda sorta not really something to worry about.  How about HONESTY and say we were breached, access to data was public and here is we have done and will do to protect your data in case YOU were compromised.  
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-14832
PUBLISHED: 2019-10-15
A flaw was found in the Keycloak REST API before version 8.0.0 where it would permit user access from a realm the user was not configured. An authenticated attacker with knowledge of a user id could use this flaw to access unauthorized information or to carry out further attacks.
CVE-2017-10022
PUBLISHED: 2019-10-15
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing ...
CVE-2019-10759
PUBLISHED: 2019-10-15
safer-eval before 1.3.4 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-10760
PUBLISHED: 2019-10-15
safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
CVE-2019-17397
PUBLISHED: 2019-10-15
In the DoorDash application through 11.5.2 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.