Page 92 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 92

Storing remotely versus locally offers huge advantages to both consumers and businesses, however,
            exposed S3 Buckets are a constant in the news these days. Too many companies in the last year alone
            (Fed Ex, Alteryx, National Credit Federation, Verizon, Australian Broadcasting Corporation, Dow Jones,
            Deep Root  Analytics, Robocent, Macy’s, Adidas, GoDaddy, SpyFone, etc.), have exposed sensitive,
            personal information of hundreds of millions of people from around the world. This epidemic has seen
            the theft or loss of more than 9 billion data records in the last five years.



            Examples of Misconfigured S3 Buckets

               ●  SpyFone, whose website hero header reads “Monitor Your Children with World’s #1 Parental
                   Monitoring  Software  –  Trusted  by  Parents  Worldwide”  left  the  data  of  thousands  of  its
                   customers—and the information of the children they were monitoring—exposed in an unprotected
                   Amazon S3 bucket.


                   According to Motherboard:

                   “The data exposed included selfies, text messages, audio recordings, contacts, location, hashed
                   passwords and logins, Facebook messages, and more.
                   A  security  researcher  found  the  data  on  an  Amazon  S3  bucket  owned  by  SpyFone,  and
                   Motherboard was able to verify that the researcher had access to SpyFone’s monitored devices’
                   data by creating a trial account, installing the spyware on a phone, and taking some pictures.
                   Hours later, the researcher sent back one of those pictures.

                   The researcher said that the exposed data contained several terabytes of “unencrypted camera
                   photos.”



               ●  GoDaddy, one of the world’s top domain name registrars with over 18 million customers, was
                   discovered to have files containing detailed server information, stored in an unsecured S3 bucket.
                   According to the report from cybersecurity firm UpGuard, the exposed documents include high-
                   level configuration information for tens of thousands of systems and pricing options for running
                   those  systems  in  Amazon  AWS,  including  the  discounts  offered  under  different  scenarios.

                   Mallory Locklear, Engadget, reported that UpGuard notified GoDaddy of the discovery shortly
                   after uncovering the exposed storage bucket, but GoDaddy didn’t secure the information for over
                   five weeks. In that time, when checking up on the progress of his report, it was said that it’s typical
                   for there to be a delay following security reports such as this one.

                   It seems in this instance that Amazon itself was the cause of the exposure. “The bucket in question
                   was created by an AWS salesperson to store prospective AWS pricing scenarios while working
                   with a customer,” an AWS spokesperson told Engadget. “No GoDaddy customer information was
                   in the bucket that was exposed. While Amazon S3 is secure by default and bucket access is






                                 92
   87   88   89   90   91   92   93   94   95   96   97