Accenture exposes 137GB of client data on unsecured AWS buckets

The servers held the "keys to the kingdom", but Accenture denies any risk-taking

Consulting and management firm Accenture accidently stored decryption keys, passwords, and sensitive client data on four unprotected AWS S3 servers, leaving them accessible to anyone with the web address.

It is the latest firm to have been caught storing data in unprotected cloud servers, potentially leaving hundreds of gigabytes of data open to the public.

Security firm UpGuard first discovered the 137GB data trove in September and immediately alerted Accenture, which promptly closed the servers. Chris Vickery, director of Cyber Risk Research at UpGuard, said that the data would have given a criminal the "keys to the kingdom", in an interview with ZDNet.

The servers were found to contain a range of sensitive data types, including passwords stored in plaintext, and decryption keys that would have allowed a hacker to impersonate a company employee.

Advertisement
Advertisement - Article continues below

"All four S3 buckets contain highly sensitive data about Accenture Cloud Platform, its inner workings, and Accenture clients using the platform," said UpGuard cyber resilience analyst Dan O'Sullivan, in a blog post.

Although specific clients have not been named in the report, Accenture counts some of the world's largest companies among its customers, including 94 of the Fortune Global 100.

One server even contained Accenture's master keys for its AWS Key Management System (KMS), which would have granted complete control over any data stored on Amazon's cloud platform. Another held details on Accenture's Google Cloud and Microsoft Azure accounts, potentially allowing a hacker to gain access to the company's assets on other services.

"Taken together, the significance of these exposed buckets is hard to overstate. In the hands of competent threat actors, these cloud servers, accessible to anyone stumbling across their URLs, could have exposed both Accenture and its thousands of top-flight corporate customers to malicious attacks that could have done an untold amount of financial damage," added O'Sullivan.

In a statement to IT Pro, an Accenture spokesperson said: "There was no risk to any of our clients - no active credentials, PII and other sensitive information was compromised. We have a multi-layered security model, and the data in question would not have allowed anyone that found it to penetrate any of those layers. The information involved could not have provided access to client systems and was not production data or applications."

There's currently no evidence that any individual or group actively exploited the publicly available data.

However, it's yet another example of a company inadvertently storing sensitive data on misconfigured servers. Last month UpGuard notified US media conglomerate Viacom that it had been storing credentials needed to build and maintain the majority of its infrastructure inside an unprotected AWS server.

Two million Dow Jones customers also had their account details leaked when criminals accessed an unprotected server in July, and 13GB of data belonging to the AA was accessed in the same month after criminals found a misconfigured AWS bucket.

Varun Badhwar, CEO of security firm RedLock, said that the number of organisations using unprotected cloud storage services has increased this year, despite warnings from the likes of Amazon about the risks of misconfigured buckets.

"The fact that a large database of credentials was compromised in this breach creates additional opportunities for hackers to infiltrate the network," said Badhwar.

Advertisement
Advertisement - Article continues below

"It's imperative that any organisation facing this type of incident replace all compromised credentials immediately. But more importantly, they must vigilantly monitor their environments for intrusions by looking for suspicious activities to contain any potential breaches."

Image: Bigstock

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/nas/27920/best-nas-drives
network attached storage (NAS)

Best NAS drives 2019

26 Apr 2019
Visit/cloud-storage/32814/dropbox-business-advanced-review-first-rate-filesharing
cloud storage

Dropbox Business Advanced review: First-rate filesharing

22 Jan 2019

Most Popular

Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/business/business-strategy/354304/ex-apple-cpu-architect-accuses-the-firm-of-invading-privacy
Business strategy

Ex-Apple CPU architect accuses the firm of invading privacy

10 Dec 2019
Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

11 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019