Menu
Blog

Misconfigured Digital Assets Are Prey for Cyberattackers

by Kelly Kuebelbeck
Misconfigured Digital Assets Are Prey for Cyberattackers
7 minute read

Website misconfigurations can lead to security incidents by creating vulnerabilities that cybercriminals can exploit. These vulnerabilities can allow unauthorized access to sensitive data, which can lead to data breaches and ransomware attacks.

In December 2024, cybersecurity researchers Noam Rotem and Ran Locar uncovered a significant cyber operation exploiting misconfigured public websites, leading to unauthorized access to sensitive data such as customer information, infrastructure credentials, and proprietary source code. This operation has been linked to the hacking groups Nemesis and the now-defunct ShinyHunters.

A Recent Cyberattack Exploited Misconfigured Digital Assets

The attackers conducted large-scale internet scans targeting vulnerable endpoints within Amazon Web Services (AWS) IP ranges. They employed tools like Shodan for reverse lookups and SSL certificate analysis to identify potential targets. By exploiting misconfigurations, they accessed confidential data, including AWS keys, database credentials, GitHub credentials, and other security secrets. 

Specifically, the cyberattack revealed that over 26 million IP addresses were scanned, exposing more than 1,500 unique Valdi customer credentials for AWS, 2 terabytes of data, 8,244 accessible S3 buckets containing exposed keys, and 252,466 exposed Git repositories.

The stolen information was reportedly marketed on Telegram channels for hundreds of euros per breach. Interestingly, the attackers inadvertently exposed their operations by storing the pilfered data and their tools in a misconfigured AWS S3 bucket, which was discovered by the researchers. 

While AWS took steps to mitigate the impact of the attack, experts warn that such operations persist. Proactive measures, including regular vulnerability assessments, remain crucial to safeguarding digital assets. This incident underscores the critical importance of proper configuration and security measures for public-facing websites and cloud services. Organizations are advised to regularly audit their systems for vulnerabilities and adhere to security best practices to prevent similar breaches.

Mechanics of the Cyberattack

The cybercriminals executed a sophisticated two-phase attack strategy aimed at maximizing their effectiveness and exploiting the vulnerabilities of their targets.

They began by utilizing publicly accessible AWS IP ranges to identify potential targets, and scanning for application vulnerabilities or misconfigurations. Tools like Shodan were leveraged for reverse lookups on IP addresses, allowing them to gather associated domain names. Additionally, they analyzed SSL certificates to expand their list of target domains.

The group examined exposed endpoints to uncover sensitive information, such as database access credentials, API keys, and other security secrets. They employed exploits like remote shells to gain deeper access to the compromised systems.

Their findings from the S3 bucket indicated that the breach involved the discovery and exploitation of targets, starting with AWS IP ranges that were expanded into domain lists via Shodan and SSL certificate analysis. Subsequent scans focused on exposed endpoints and system types, enabling the extraction of data like database credentials and AWS keys.

The attackers deployed custom scripts, including those written in Python and PHP, to exploit open-source tools like Laravel and harvest credentials for services such as Git, SMTP, and cryptocurrency wallets. Verified credentials were stored for later use, and remote shells were installed to facilitate deeper access when required.

The attackers tested AWS keys for access to services like IAM, SES, SNS, and S3, which allowed them to establish persistence, send phishing emails, and steal sensitive data. Notably, AI service keys were excluded, likely due to outdated tools or limited value.

The sensitive information stolen included AWS keys and credentials from well-known platforms like GitHub, Twilio, and cryptocurrency exchanges. These verified credentials were subsequently sold on Telegram channels for hundreds of euros per breach.

These technologically advanced cybercriminal syndicates operate on a large scale for profit. Leveraging their expertise, they identify weaknesses in the controls of enterprises transitioning to cloud computing, exploiting the complexities that these organizations often fail to fully understand. The extensive range of targeted information and the significant scale of their criminal operations are particularly noteworthy.

Misconfigured Digital Assets Expose Credentials

Misconfigured digital assets can inadvertently expose sensitive credentials, leaving organizations vulnerable to security threats. This can occur in several ways:

  • Exposed Private Services to the Public Internet: If an organization misconfigures its firewall or cloud security groups, internal services (such as web servers, databases, or certificate management services) may become accessible from the Internet. Attackers scanning public IP ranges can discover these exposed services and potentially extract SSL certificates, private keys, or other sensitive data.
  • Misconfigured Cloud Storage Buckets: Cloud storage services (e.g., AWS S3, Azure Blob Storage, Google Cloud Storage) are sometimes misconfigured with public access. If SSL private keys, certificates, or related files are stored in such a bucket without proper restrictions, attackers can retrieve them.
  • Leaked Internal IP Ranges in Logs or DNS: Organizations sometimes use internal IP ranges for development or testing environments. If these IPs are leaked in logs, DNS records, or exposed configuration files, attackers can probe these addresses for vulnerabilities and access SSL credentials.
  • Improperly Configured Load Balancers and Proxies: Load balancers and reverse proxies often terminate SSL connections before forwarding traffic internally. If misconfigured, they may expose SSL credentials to unauthorized entities or allow unintended access to backend services.
  • Open Ports and Weak Network Segmentation: Open ports on misconfigured IP ranges may expose SSL certificate management interfaces (such as Let's Encrypt's ACME clients or internal PKI infrastructure). Attackers could exploit weak authentication mechanisms to issue, revoke, or steal SSL certificates.
  • Exposed Git Repositories or CI/CD Pipelines: If developers store SSL certificates or private keys in misconfigured public repositories or CI/CD pipelines with incorrect IP restrictions, these credentials can be accessed by unauthorized parties.

Mitigation and Prevention Strategies

By implementing the following strategies, organizations can significantly enhance their security posture and protect their critical assets from potential threats.

  1. Configure Firewall Rules: It is essential to properly configure firewall rules to restrict access to internal services. By doing so, organizations can limit exposure to potential threats, ensuring that only authorized traffic is allowed to interact with sensitive internal resources.
  2. Regular Audits and Monitoring: Conducting regular audits and ongoing monitoring of IP ranges is crucial to detect any exposed services. This proactive approach helps teams identify vulnerabilities and rectify them before they can be exploited by malicious actors.
  3. Network Segmentation: Implementing network segmentation is a key strategy for enhancing security. By separating SSL credential storage from public-facing services, organizations can create a more robust defense against unauthorized access, ensuring that sensitive information is isolated and protected.
  4. Secure SSL Private Key: It is imperative to encrypt and securely store SSL private keys. Utilizing hardware security modules (HSMs) or dedicated key management systems adds an extra layer of protection, ensuring that these critical assets are safeguarded against theft or misuse.
  5. Restrict Access to Cloud Storage: To further protect sensitive information, organizations should restrict access to cloud storage buckets. It is vital to avoid storing sensitive credentials in publicly accessible locations, as this practice significantly reduces the risk of data breaches and unauthorized access.
  6. Log and DNS Monitoring: Continuous monitoring of logs and DNS records is essential to detect any inadvertent leaks of internal IP addresses. By keeping an eye on these indicators, organizations can quickly identify potential issues and take corrective action before they lead to a security incident.

Get a Clear Picture of Your External Attack Surface with ZeroFox 

Implementing a comprehensive external attack surface discovery and management strategy, leveraging advanced methods, can significantly reduce the risk of overlooking valuable digital assets. 

The ZeroFox external cybersecurity platform combines the power of AI, full-spectrum intelligence services, and takedown and incident response capabilities. Our External Attack Surface Management (EASM) solution adds powerful continuous discovery, identification, and inventory capabilities to protect your expanding external attack surface, including:

  • Discover and inventory digital assets
  • Visualize your external digital risk from one view
  • Analyze and prioritize exposures and vulnerabilities
  • Combat asset sprawl and shadow IT
  • Detect data leakage
  • Reduce the risk of phishing and social engineering attacks
  • Adhere to regulatory compliance requirements

Are you serious about detecting exposed digital assets? Learn how ZeroFox’s EASM asset discovery methods can help. Contact us today to learn how ZeroFox can assist you in taking control of your digital security.

Kelly Kuebelbeck

Senior Product Marketing

Kelly Kuebelbeck is a dedicated threat researcher with a strong passion for understanding and combating cybercrime. She has over 15 years of marketing experience in cybersecurity, IoT risk management, and healthcare technology management. As a senior product marketer at Zerofox, Kelly oversees EASM (Enterprise Attack Surface Management) breach prevention technologies, develops product content, and supports product launches. Before joining Zerofox, she held marketing leadership positions at Asimily, Smarten Spaces, and Accruent.

Tags: Cyber TrendsData BreachesExternal Attack Surface Management

See ZeroFox in action