Misconfigured Git servers lead to Nissan data leak

Leak stemmed from Nissan using of default “admin” password

Nissan sign on a background of the sky

Swiss-based software engineer and security researcher Tillie Kottmann has discovered the source code for Nissan North America’s internal mobile apps and tools on a misconfigured Git server.

Kottmann said in a tweet he’d found a “complete dump” of all Git repositories from Nissan NA. The dump included sources for the Nissan NA mobile apps, some parts of the ASIST diagnostics tool, and the dealer business systems and portal.

The researcher also found details on Nissan’s internal core mobile library, NCAR/ICAR services, client acquisition and retention tools, sale/market research tools and data, various marketing tools, and vehicle logistics portal.

The leak stemmed from a Git server that was left visible online with its default username and password combo of “admin.” Nissan is probing the leak, and the Git server was taken offline after the data started disseminating on Monday via Telegram channels and hacking forums.

The security researchers who uncovered the misconfigurations received a tip about Nissan's Git server after they found a similarly misconfigured GitLab server in May 2019.

Martin Jartelius, CSO at Outpost24, told ITPro that it’s a basic security control to change the vendor default passwords when deploying a system. 

“From the nature of the content, this should be a production system and reviewed prior to having the source code uploaded. This basic control forms part of most organizations ISMS standards, i.e., ISO27001 policies and regulations internally. As Nissan Japan had their 9001 certificate revoked in 2017 by authorities it is not the first time the successful implementation of good plans and strategies has not reached all the way to execution in the large organization,” Jartelius said.

Mark Bower, SVP at comforte AG, told ITPro that this leak was a "classic example of the security being only as good as the weakest link".

"Most likely, in this case, [this is] down to both human error and lack of process for risk scanning of critical infrastructure for vulnerable credentials and effective data security,” Bower said. "The recent Solarwinds situation should have prompted organisations across the industry to revisit their supply chain security, data security and authentication as a matter of priority – including any internet-facing or cloud components."

Featured Resources

Choosing a collaboration platform

Eight questions every IT leader should ask

Download now

Performance benchmark: PostgreSQL/ MongoDB

Helping developers choose a database

Download now

Customer service vs. customer experience

Three-step guide to modern customer experience

Download now

Taking a proactive approach to cyber security

A complete guide to penetration testing

Download now

Recommended

Geico data breach leads to stolen driver’s license numbers
data breaches

Geico data breach leads to stolen driver’s license numbers

21 Apr 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
REvil threatens to release Apple’s hardware schematics
ransomware

REvil threatens to release Apple’s hardware schematics

21 Apr 2021