Security News > 2021 > February > Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files

Open-source tool BlobHunter helps pinpoint public Azure blobs that might contain sensitive files
2021-02-08 12:07

CyberArk researchers have released BlobHunter, an open-source tool organizations can use to discover Azure blobs containing sensitive files they have inadvertently made public.

Despite access to the files uploaded to cloud storages being by default private and cloud providers constantly sharing and reiterating best practices for securing them, misconfigurations happen all the time, making potentially sensitive information publicly accessible to anyone who knows how to find it.

CyberArk Labs researchers Daniel Niv and Asaf Hecht wanted to see just how much sensitive information is publicly available on Azure's Blob Storage, a service designed specifically for storing unstructured data, data for backup and restore, files for distributed access, etc.

The result of their research was dishearthening - they found some 2.5 million records and files that included personally identifiable information, 2,300 files related to individuals' health status, 2,000 files containing financial information, one million invoice files, half a million log files, as well as files containing encryption and firmware keys, SSH, SSL VPN, SMTP and MySQL usernames and passwords, and more.

"We recommend everyone to look at the containers and files they are storing in any cloud system and make sure they have the correct access permissions."

To help organizations pinpoint publicly opened Azure blobs, the researchers created and made available BlobHunter, a Python-based tool that audits their Microsoft Azure storage accounts and checks their file access levels.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/m-XWdnl8-QU/