Accenture has reported leaked information on at least four cloud-based Amazon S3 storage servers.
The publicly downloadable servers exposed secret API data, authentication credentials, certificates, decryption keys, customer information, and other details that could be used to attack Accenture or one of its high profile clients.
The S3 buckets were found to be configured for public access, allowing anyone to download the data of they entered the relevant web addresses information their web browser. Learn about NNT’s System Hardening & Vulnerability Management solution.
One of the servers contained 40,000 plain text passwords, many of whom could belong to Accenture clients. Another server contained internal access keys and credentials for use by the Identity API used to authenticate credentials, and the master access keys for Accenture’s account with the AWS Key Management Service. If these credentials were stolen, this could allow an attacker full control over the company's encrypted data stored on Amazon's servers.
The information within these cloud servers in the wrong hands can do some serious harm to Accenture and its elite customer base.
Read this article on InfoSecurity Magazine