Accenture exposes 137GB of client data on unsecured AWS buckets

The servers held the "keys to the kingdom", but Accenture denies any risk-taking

Consulting and management firm Accenture accidently stored decryption keys, passwords, and sensitive client data on four unprotected AWS S3 servers, leaving them accessible to anyone with the web address.

It is the latest firm to have been caught storing data in unprotected cloud servers, potentially leaving hundreds of gigabytes of data open to the public.

Advertisement - Article continues below

Security firm UpGuard first discovered the 137GB data trove in September and immediately alerted Accenture, which promptly closed the servers. Chris Vickery, director of Cyber Risk Research at UpGuard, said that the data would have given a criminal the "keys to the kingdom", in an interview with ZDNet.

The servers were found to contain a range of sensitive data types, including passwords stored in plaintext, and decryption keys that would have allowed a hacker to impersonate a company employee.

"All four S3 buckets contain highly sensitive data about Accenture Cloud Platform, its inner workings, and Accenture clients using the platform," said UpGuard cyber resilience analyst Dan O'Sullivan, in a blog post.

Although specific clients have not been named in the report, Accenture counts some of the world's largest companies among its customers, including 94 of the Fortune Global 100.

One server even contained Accenture's master keys for its AWS Key Management System (KMS), which would have granted complete control over any data stored on Amazon's cloud platform. Another held details on Accenture's Google Cloud and Microsoft Azure accounts, potentially allowing a hacker to gain access to the company's assets on other services.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Taken together, the significance of these exposed buckets is hard to overstate. In the hands of competent threat actors, these cloud servers, accessible to anyone stumbling across their URLs, could have exposed both Accenture and its thousands of top-flight corporate customers to malicious attacks that could have done an untold amount of financial damage," added O'Sullivan.

In a statement to IT Pro, an Accenture spokesperson said: "There was no risk to any of our clients - no active credentials, PII and other sensitive information was compromised. We have a multi-layered security model, and the data in question would not have allowed anyone that found it to penetrate any of those layers. The information involved could not have provided access to client systems and was not production data or applications."

There's currently no evidence that any individual or group actively exploited the publicly available data.

However, it's yet another example of a company inadvertently storing sensitive data on misconfigured servers. Last month UpGuard notified US media conglomerate Viacom that it had been storing credentials needed to build and maintain the majority of its infrastructure inside an unprotected AWS server.

Advertisement - Article continues below

Two million Dow Jones customers also had their account details leaked when criminals accessed an unprotected server in July, and 13GB of data belonging to the AA was accessed in the same month after criminals found a misconfigured AWS bucket.

Varun Badhwar, CEO of security firm RedLock, said that the number of organisations using unprotected cloud storage services has increased this year, despite warnings from the likes of Amazon about the risks of misconfigured buckets.

"The fact that a large database of credentials was compromised in this breach creates additional opportunities for hackers to infiltrate the network," said Badhwar.

"It's imperative that any organisation facing this type of incident replace all compromised credentials immediately. But more importantly, they must vigilantly monitor their environments for intrusions by looking for suspicious activities to contain any potential breaches."

Image: Bigstock

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/data-insights/big-data/356291/fivetran-is-now-worth-12-billion-thanks-to-new-funding
big data

Fivetran is now worth $1.2 billion thanks to new funding

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020

Most Popular

Visit/business/business-operations/356395/nvidia-overtakes-intel-as-most-valuable-us-chipmaker
Business operations

Nvidia overtakes Intel as most valuable US chipmaker

9 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/server-storage/servers/356083/the-best-server-solution-for-your-smb
Sponsored

The best server solution for your SMB

26 Jun 2020