Developers left large cache of credentials exposed on code generation websites

Weak response

The researchers identified many large organizations whose data was exposed in the URLs, including those in government, critical national infrastructure, healthcare, banking, and even a prominent cyber security company.

One curious discovery was data posted by an MSSP: the Active Directory (AD) username and email credentials belonging to one of its clients, a large US bank. Given that the data wasn’t valid JSON, the researchers surmise that the individual who posted the data was simply using the service to generate a URL through which to share credentials.

When the researchers tried to alert the affected companies to their data leaks, they were often ignored. “Of the affected organizations that we tried to contact, only a handful (thank you) responded to us quickly. The majority didn’t bother, despite attempts at communication across multiple channels,” said watchTowr principal researcher Jake Knott, in a blog.

Donner Music, make your music with gear
Multi-Function Air Blower: Blowing, suction, extraction, and even inflation

Leave a reply

Please enter your comment!
Please enter your name here