Security Market Segment LS
Saturday, 18 November 2017 19:44

Pentagon intelligence op leaks data through Amazon servers Featured

By

Billions of posts scraped from the Internet in what appears to be an US Department of Defence intelligence-gathering operation have been exposed to the public through misconfigured Amazon Web Services S3 repositories.

The data was found by the Cyber Risk Research team at security provider UpGuard which has made several similar discoveries in the past.

The data in question was collected by the US central Command and the US Pacific Command and was in three publicly downloadable cloud-based storage servers.

UpGuard said one of the buckets contained about 1.8 billion posts collected over the past eight years. The content came from news sites, comment sections, Web forums, and social media sites like Facebook in multiple languages and from countries around the world.

There were many benign public Internet and social media posts by Americans as well, which appeared to have been collected in the apparent intelligence-gathering operation, raising questions of privacy and civil liberties, UpGuard said.

In the past, UpGuard has found misconfigured Amazon Web Services S3 buckets leaking data from global corporate consulting and management firm Accenture, publisher Dow Jones, a Chicago voter database, a North Carolina security firm, and a contractor for the US National Republican Committee.

The discovery was made by Chris Vickery, the director of the company's Cyber Risk Research unit. The three S3 buckets were configured to allow any AWS global authenticated user to look at or download the data. A free sign-up provides an AWS account of this type.

The sub-domain names of the buckets were “centcom-backup,” “centcom-archive,” and “pacom-archive”, which gave an indication of where the data within came from.

UpGuard wrote: "CENTCOM refers to the US Central Command, based in Tampa, Florida, and responsible for US military operations from East Africa to Central Asia, including the Iraq and Afghan Wars. PACOM is the US Pacific Command, headquartered in Aiea, Hawaii, and covering East, South, and Southeast Asia, as well as Australia and Pacific Oceania."

Within the bucket "centcom-backup", there were indications that the software was used by a vendor known as VendorX. The application, known as Outpost, is a Pentagon social engineering effort.

UpGuard has a detailed blog post about the find here.

LEARN HOW TO BE A SUCCESSFUL MVNO

Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments