Click For Photo: https://regmedia.co.uk/2017/10/10/leak_shutterstock.jpg?x=1200&y=794
Yet another organization has been caught exposing sensitive data to the public internet: this time it is Accenture – consultants to the great and the good – with a misconfigured AWS S3 bucket leaking access keys and other private documents.
On September 17, veteran cloud watchdog Chris Vickery at security shop Upguard found four AWS S3 storage buckets open to the public. The repositories, labelled “acp-deployment,” “acpcollector,” “acp-software,” and “acp-ssl,” contained hundreds of gigabytes of files belonging to Accenture – from internal emails to login credentials stored in plaintext – and were set up by a user called awsacp0175. All the data was accessible to anyone stumbling across the online silos.
Bucket - Keys - Credentials - Accenture - Systems
One exposed bucket contained what looked like cryptographic keys and credentials for accessing internal Accenture systems. There was also a section labeled – ironically, as it turns out – “Secure Store” which held a plaintext file of the master access key for Accenture’s account with AWS' Key Management Service, used to encrypt and decrypt data in the cloud.
Also in that archive were a number of client.jks key stores which, while encrypted, had what appeared to be the passwords to unlock them written down in files next to them in plaintext. The trove also appeared to contain Accenture clients' private signing keys.
Acpcollector - Information - Accenture - Systems - VPN
Acpcollector contained information on how to get into and maintain Accenture's various cloud-hosted systems, including VPN keys to dive into Accenture’s private production network, potentially allowing miscreants into...
0 other people are viewing this story
Wake Up To Breaking News!