Wednesday , December 4 2024
red circle

Data broker exposes 600K+ passwordless sensitive files online

SL Data Services/Propertyrec, an information research provider exposes a non-password-protected database containing more than 600K records according to the security researcher Jeremiah Fowler. The dataset contains over 713 GB records including vehicle records, property ownership reports and court records.

Jeremiah Fowler said, around 95% of the limited sample of documents were The “background checks” included full names, addresses, phone numbers, email addresses, employment details, family members, social media accounts, and criminal records. I discovered that some individuals with unique names shared the same name and home address found in these checks.

CISA Flags 3 Actively Exploited Vulnerabilities in KEV

CISA has issued an alert about three critical security vulnerabilities that are currently being exploited. These issues are now part...
Read More
CISA Flags 3 Actively Exploited Vulnerabilities in KEV

Cisco Confirms Active Exploitation Of Decade-Old WebVPN Vulnerability

Cisco has released an updated security advisory about CVE-2014-2120, a vulnerability in the WebVPN login page of Cisco Adaptive Security...
Read More
Cisco Confirms Active Exploitation Of Decade-Old WebVPN Vulnerability

TP-Link Archer Security Flaw Exposes Devices to Malicious Command Injection

A serious zero-day vulnerability has been found in TP-Link Archer, Deco, and Tapo routers, which could let attackers inject harmful...
Read More
TP-Link Archer Security Flaw Exposes Devices to Malicious Command Injection

IBM address multiple flaw in security verify access appliance

IBM revealed several critical vulnerabilities in its Security Verify Access Appliance, which could pose serious security risks to users identified...
Read More
IBM address multiple flaw in security verify access appliance

“Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

Cybersecurity researchers are alerting users about phishing email campaigns using a toolkit called "Rockstar 2FA" to steal Microsoft 365 account...
Read More
“Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

Workshop on “DDoS use cases & solutions for government & BFSI” held at BCS

A workshop on "DDoS use cases & solutions for government & BFSI" held at Bangladesh computer society premises on Saturday...
Read More
Workshop on “DDoS use cases & solutions for government & BFSI” held at BCS

Uganda confirms hack of central bank accounts, Refutes $17 Million Claim

Uganda’s finance ministry confirmed media reports that hackers breached the central bank’s systems and stole money, but refuted the claims...
Read More
Uganda confirms hack of central bank accounts, Refutes $17 Million Claim

CVE-2024-11667
Hackers actively exploiting Zyxel firewall to deploy Ransomware

CERT Germany and Zyxel have alerted about a serious vulnerability in Zyxel firewalls, identified as CVE-2024-11667. This flaw is being...
Read More
CVE-2024-11667  Hackers actively exploiting Zyxel firewall to deploy Ransomware

Daily Security Update Dated: 29.11.2024

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update  Dated: 29.11.2024

CIRT-in flags Critical Flaw in Oracle Agile PLM Framework

CERT-In has flagged a security vulnerability in Oracle’s Agile Product Lifecycle Management (PLM) software, identified as CVE-2024-21287 and cataloged as...
Read More
CIRT-in flags Critical Flaw in Oracle Agile PLM Framework

According to the researcher, the exposed dataset suggest the company operates a network of 16 different websites. For example, Propertyrec — a website that lists property and real estate data — was mentioned in the database’s name. After a responsible disclosure, The company restricted the public access over one week later, said Jeremiah Fowler.

Court records and sex offender statuses are typically public in the US, but this data could be merged with other information to create detailed profiles of individuals and their families, aiding criminals in targeted phishing and social engineering attacks. Another concern is impersonation, where a criminal uses the identity of someone whose personal information was leaked in a background check.

Using personally identifiable information (PII), like customer names and locations, in filenames for internal document storage can make file organization easier, but it’s not secure. If a data breach occurs, these filenames can lead to privacy risks, even more so if the files aren’t encrypted. Unauthorized users might access PII just by viewing the directory or file metadata without needing to open the file.

This discovery follows the August 2024 data breach of National Public Data, which exposed the personal information of millions. Hackers accessed the company’s systems and put the stolen data, including names, addresses, and phone numbers, for sale on the dark web for $3.5 million USD. The dataset included personal information of citizens from the US, Canada, and the UK.

The register reported, ” The info service provider eventually closed up the S3 bucket, says Fowler, although he never received any response. The Register also reached out to SL Data Services for comment and did not hear back.”

Check Also

Rockstar 2FA

“Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks

Cybersecurity researchers are alerting users about phishing email campaigns using a toolkit called “Rockstar 2FA” …

Leave a Reply

Your email address will not be published. Required fields are marked *