Another Day, Another Company Leaving Sensitive User Data Exposed Publicly On The Amazon Cloud

from the dysfunction-junction dept

What is it about companies leaving consumer data publicly exposed on an Amazon cloud server? Verizon made headlines after one of its customer service vendors left the personal data of around 6 million consumers just sitting on an Amazon server without adequate password protection. A GOP data analytics firm was also recently soundly ridiculed after it left the personal data of around 198 million citizens (read: most of you) similarly just sitting on an Amazon server without protection. Time Warner Cable also recently left 4 million user records sitting in an openly-accessible Amazon bucket.

You’d think that after all of this press attention fixated on a fairly basic (but massive) screw up, that companies would stop doing this. But you’d be wrong.

The latest company to fail at fundamental security practices is California’s Bank of Cardiff, which managed to leave millions of phone recordings made by employees — you guessed it — in an unsecured Amazon cloud bucket open wide to the general internet. Many of the phone recordings exposed include bank employees talking with customers about sensitive financial transactions:

“Many of the calls appear to be Bank of Cardiff employees phoning up individuals the bank has discussed loans with, or attempting to offer them one. One call includes a potential customer discussing their plans for obtaining financing either from Bank of Cardiff or a competitor. In another, an employee contacts a company focused on industrial equipment; Motherboard identified the company because of its hold music which includes the firm’s website. The company did not respond to a request for comment. In a third call, an employee contacted a company about a business loan.”

Yeah, whoops-a-daisy. The practice by lazy and/or incompetent companies has basically made a career for folks like UpGuard cyber risk analyst Chris Vickery, who has spent the better part of the last few years searching and exposing companies that can’t be bothered to secure their cloud accounts. But again, it’s absolutely incredible given the media exposure of this basic gaffe that every company on the planet hasn’t done an audit to make sure their brand isn’t the next one in lights for security incompetence.

Bank of Cardiff has yet to issue a public statement on the exposure, but it did finally lock down access to the data trove once journalists and security researchers (once again) did their jobs for them.

Filed Under: ,
Companies: amazon, bank of cardiff

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Another Day, Another Company Leaving Sensitive User Data Exposed Publicly On The Amazon Cloud”

Subscribe: RSS Leave a comment
13 Comments
That One Guy (profile) says:

Like walking around wearing a neon target front and back

The practice by lazy and/or incompetent companies has basically made a career for folks like UpGuard cyber risk analyst Chris Vickery, who has spent the better part of the last few years searching and exposing companies that can’t be bothered to secure their cloud accounts.

Given how many companies seem to have a ‘shoot the messenger’ mindset I’m rather surprised someone who does that on a regular basis hasn’t been sued into the ground by companies looking to blame anyone but themselves for their lousy security practices.

That Anonymous Coward (profile) says:

Re: Like walking around wearing a neon target front and back

Something something Dentist guy??

There was another stupid company found to have their data accessible in the last day or so. Its only medical information so they ignored the researcher who tried to inform them ‘the right way’. Then he went public, they the claimed it was hacking, then claimed it was test info, then claimed ok it was only the info of some friends of ours…. The data was still online as they were making these statements.

The media jump on the evil superhacker narrative, because thats what they do. It is impossible to find any media willing to pillory a company for horrific practices.

If only we could get an executive order fixing actual problems instead of trying to fight the ‘zomg conservative bias’ delusion.

PaulT (profile) says:

There’s honestly no excuse for this any more. Amazon defaults everything to secure, you have to explicitly allow public access and any remotely competent team will have run an audit on existing buckets and scripts since these scandals started breaking. For this to happen on any kind of large scale, it’s either gross incompetence or deliberate sabotage.

Sadly, the most likely explanation is simply cost-cutting. A lot of companies making these kinds of mistakes are either too cheap to hire competent admins (usually leaving infrastructure decisions to developers, who will always favour ease of use over security) or otherwise leave too many security decisions in the hand of departments who don’t really have any right making them, often because they don’t want to pay for dedicated security staff until something bites them in the ass. That kind of cheap decision making is scarily common with banks, for some reason.

PaulT (profile) says:

Re: Re: Re:

Yeah, that was a little over generalised, but I was soured a little bit after working at a company with a contractor who refused to tell us accurate information about which ports some core software was running on because he hated working around firewalls. That was ridiculous, but it was clear that some minority of devs actually prefer to risk the entire company than make life a little more difficult for themselves.

I know that plenty of devs are conscious to some degree about security, and some extremely competent in that area, but my general experience is that at crunch time it gets left way in the background and not everybody is good at going back to tighten things down for production. My only experience with ransomware, for example, was when a dev decided to open elasticsearch ports to the public while I was on holiday to test a new reporting app release and forgot to remove the allow rule when he finished testing. Fortunately, my backup schedule was robust so we could laugh the demand off and only lost around 6 hours of overnight data in a company that’s focussed on retail business hours.

Bravo if you’re one of the good ones, but I fear you’re not in the majority, and I do find it’s slipping as less new devs have experience with setting up infrastructure and rely on cloud providers to do most of the heavy lifting.

TripMN says:

Re: Re:

Financial institutions on the web astound me. I’ve run into several cases where my password was limited to less than 16 characters (I can’t have a long secure password, what?). I’ve also found many of them lack any kind of 2-factor authentication, and those that do seem to only allow SMS (a known broken attack vector) or email.

It’s just crazy that institutions that have large chunks of other people’s money are so bad at this.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...