Unprotected Database Exposed Details of Over 80 Million U.S. Households


Surety researchers found an unprotected database stored on the cloud that suppressed detailed information of over 80 million U.S. households.

vpnMentor’s Noam Rotem and Ran Locar determined the unprotected database hosted on a Microsoft cloud server during the procedure of a web mapping project. When they peered inside, they organize that the asset contained 24 GB of information pertaining to 80 million U.S. households–multitudinous than half of the total number of American homes. These point by points included the number of people living at each household along with each of these individuals’ filled names, marital status, income bracket and age.

Unprotected Database Exposed Details of Over 80 Million U.S. Households
Screenshot of a typical memo from the database. (Source: vpnMentor)

As noted by the researchers in a write-up of their uncovering, digital criminals can abuse these pieces of information to commit uniqueness theft, stage phishing attacks, infect individuals exposed in the observations leak with ransomware, collect data for future attacks and all the more burglarize their homes.

Rotem and Locar indicated that they didn’t separate to whom the database belonged, though based on the information involved, they offset an educated guess that an organization in insurance, healthcare or mortgages owned the asset. They then sought the public for help them in identifying the database’s owner so that they could let them be acquainted with about the data leak.

Shortly after their research went active, however, Microsoft took down the database and issued the following annunciation: “We have notified the owner of the database and are taking appropriate steps to supporter the customer remove the data until it can be properly secured.” The tech monster did not publicly release the name of the owner.

Tim Erlin, VP of Product Management & Game at Tripwire, explains that it’s not unusual for the identity of an owner of exposed observations to be unknown. He admitted that the security community could only speculate close by the exposure until (if ever) it learned the identity of the owner. But he did explain that organizations can mind themselves against suffering similar exposures in the meantime.

It’s clear, after so numberless incidents, that organizations do not have control over access to their matter stored in the cloud. It’s not for a lack of tools, but a lack of understanding and implementation of the at tools. If you are storing data in the cloud, you can and should be able to audit the access leaves for that data on a continuous basis.

To adequately protect their cloud-hosted details, organizations need to follow a strategy to tighten their cloud pledge stance. This approach should involve the use of the solution built on top of main security controls. Learn how Tripwire fulfills this recommendation.

Leave a Reply

Your email address will not be published. Required fields are marked *