Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security

1/18/2019
08:15 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Exposed Oklahoma Server Shows On-Premises Data Is Vulnerable, Too

Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.

Over the last 12 months, dozens of security stories documented how easily data can leak when enterprises leave business and customer data unsecured in databased hosted by various public cloud services.

However, on-premises data is equally vulnerable to attackers who can sniff out poor security practices.

This week, security firm UpGuard released a report that detailed how a on-premises storage server belonging to the Oklahoma Department of Securities (ODS) had been left exposed to the public-facing Internet, leaving about 3TB of data and millions of files exposed to anyone who knew where to look for the IP address.

Specifically, the data was left exposed through an unsecured sync service belonging to an address registered to the Oklahoma Office of Management and Enterprise Services.

It's not clear if anyone ever found and downloaded the data, and the ODS responded quickly to the UpGuard researchers and closed off access to the server. However, the type of data this system contained could prove extremely valuable to someone looking to steal data.

The ODS is part of the state's Department of Securities, which functions much like the federal Securities and Exchange Commission. The department ensures that securities are being traded legally and it can conduct investigations into fraud and other consumer complaints.

(Source: iStock)
(Source: iStock)

This created a treasure-trove of data, some of it dating back to the mid-1980s, including details of FBI investigations. The last entry dated to 2016.

"In the course of our research we have developed a data taxonomy based on the types of entities affected by breaches. In this case we found examples of the many of the types of data that might be leaked in a breach," according to the January 16 report.

Among the 3TBs, researchers found:

  • A Microsoft Access database that contained information on approximately 10,000 brokers, including social security numbers
  • A CSV file that contained the date of birth, state of birth, country of birth, gender, height, weight, hair color and eye color for more than 1000,000 brokers
  • Finally, a database that contained viators -- a financial vehicle that allows terminally ill patients can sell their life insurance benefits -- which contained data on AIDS patients

What's particularly interesting is that researchers found the exposed government server using Shodan, a search engine for locating Internet-facing IP addresses. No complicated hacking tools were needed.

It's not clear how long the server was left exposed but the Shodan search engine noted it was first registered on November 30, 2018.

Incidents such as these show that no matter where data is stored -- public cloud, private data or a hybrid environment -- poor security practices often mean data is left exposed and can be found with relative ease. (See Unsecured Veeam Database Reportedly Exposed Millions of Records.)

Even something as basic as two-factor authentication could easily have cut down some of the risk in this week's case.

"This is just another example for the need to tightly control and maintain the cyber posture of all internet-facing servers, both on-prem and within the public cloud," Praveen Jain, the CTO of Cavirin, which provides security tools for hybrid cloud environments, noted in an email to Security Now.

"The solution combines training, better processes, as well as rigorous OS hardening, updates, and patching of vulnerabilities," Jain added. "And, as noted, tools like Shodan make it all too easy for hackers to scan the Internet for public servers and then probe for vulnerabilities. So, the issue will not go away any time soon."

These sentiments were echoed by Anurag Kahol, the CTO of security vendor Bitglass.

"While all organizations need to defend their data, government agencies, in particular, must adhere to the highest of security standards -- the type of information that they collect, store and share demands it," Kahol wrote in an email.

With the server, many of the files were back-ups, including for email files and virtual machines. While this type of back-up system is considered essential for recovering from a disaster or a ransomware attack, "the final crucial step is to maintain control over every copy of those data stores," the UpGuard report notes. (See Cloud Backup: How It Can Protect Against Ransomware.)

Related posts:

— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31476
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han...
CVE-2021-31477
PUBLISHED: 2021-06-16
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GE Reason RPV311 14A03. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firmware and filesystem of the device. The firmware and filesystem contain hard-...
CVE-2021-32690
PUBLISHED: 2021-06-16
Helm is a tool for managing Charts (packages of pre-configured Kubernetes resources). In versions of helm prior to 3.6.1, a vulnerability exists where the username and password credentials associated with a Helm repository could be passed on to another domain referenced by that Helm repository. This...
CVE-2021-32691
PUBLISHED: 2021-06-16
Apollos Apps is an open source platform for launching church-related apps. In Apollos Apps versions prior to 2.20.0, new user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within th...
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).