BreachExchange mailing list archives
Insecure server left carmakers' trade secrets wide open
From: Destry Winant <destry () riskbasedsecurity com>
Date: Mon, 23 Jul 2018 18:21:17 -0500
https://www.itnews.com.au/news/insecure-server-left-car-makers-trade-secrets-left-wide-open-498834 A misconfigured data transfer server left sensitive data from big name car makers and their employees wide open to the internet, a security vendor has revealed. Canada's Level One Robotics, which provides automation services for global companies such as VW, Chrysler, Ford, Toyota, Tesla and ThyssenKrupp, is at the centre of the incident. The company uses the open source rsync data transfer and synchronisation utility to mirror information across internet-connected servers. However, researchers at Upguard discovered and made public that Level One's Robotics rsync setup did not limit which clients could access it. This meant anyone who could connect to the rsync server at Level One Robotics and download the data it stored. All in all, some 157GB of sensitive information was left exposed by Level One Robotics. This included customer data such as factory plans, assembly line schematics, robot configurations, identity badge requests and virtual private networking access forms, along with non-disclosure agreements. Ford Thailand, Toyota Canada, GM, KUKA, Pratt & Whitney, Tesla, and VW Group of America are some of the big name manufacturers whose data was left exposed. Upguard also found sensitive Level One Robotics data for employees, including scans of passports, driver's licenses and other identification. Level One Robotics' corporate data was also included in the rsync collection with invoices, price lists, insurance polices and other enterprise business documents stored on the server. Not only did Level One Robotics not limit access to the rsync server, but it was also configured to allow anyone write to it as well. This left files stored on the rsync server open to manipulation and alteration. Upguard said bank account numbers for direct deposits could have been changed in business documents, or malware planted in the files on the server. The insecure server was discovered by Upguard on July 1, and Level One Robotics closed off access to it on July 10. Neither Upguard nor Level One Robotics have said how long the rsync server was left exposed, or if there was any unauthorised access to it. _______________________________________________ BreachExchange mailing list sponsored by Risk Based Security BreachExchange () lists riskbasedsecurity com If you wish to Edit your membership or Unsubscribe you can do so at the following link: https://lists.riskbasedsecurity.com/listinfo/breachexchange
Current thread:
- Insecure server left carmakers' trade secrets wide open Destry Winant (Jul 24)