Software

Databases

Who left a database of emails, credit cards, plain-text passwords, and more open to the web this week? Tech Data, come on down!

Business IT giant that services Apple, Cisco, and others, exposed 264GB of info


IT gear distributor Tech Data is the latest company to expose an insecure database, jam packed with personal and sensitive information, to the public internet for anyone to rifle through.

A team at network security outfit vpnMentor was scanning cyber-space as part of a web-mapping project when they happened upon a Graylog management server belonging to Tech Data that had been left freely accessible to the public. Within that database, we're told, was a 264GB cache of information including emails, payment and credit card details, and unencrypted usernames and passwords. Pretty much everything you need to ruin someone's day (or year).

The exposure, vpnMentor told The Register today, is particularly bad due to the nature of Tech Data's customers. The Fortune 500 distie provides everything from financing and marketing services to IT management and user training courses. Among the clients listed on its site are Apple, Symantec, and Cisco.

"This is a serious leak as far as we can see, so much so that all of the credentials needed to log in to customer accounts are available," a spokesperson for vpnMentor told El Reg. "Because of the size of the database, we could not go through all of it and there may be more sensitive information available to the public than what we have disclosed here."

In addition to the login credentials and card information, the researchers said they were able to find private API keys and logs in the database, as well as customer profiles that included full names, job titles, phone numbers, and email and postal addresses. All available to anyone who could find it.

vpnMentor says it discovered and reported the open database on June 2 to Tech Data, and by June 4 the distie had told the team it had secured the database and hidden it from public view. Tech Data did not respond to a request for comment from The Register. The US-based company did not mention the incident in its most recent SEC filings.

That marketing email database that exposed 809 million contact records? Maybe make that two-BILLION-plus?

READ MORE

Should the exposed information prove genuine and current, Tech Data would likely have a messy clean-up on its hands, given the sensitive nature of the information that it had exposed. In addition to the login credentials and bank details, the database is said to contain sensitive corporate information that could prove useful for rival businesses or hostile governments.

"As Tech Data is such a significant player in the industry, the exposed database leaves it vulnerable to competitors looking to gain an unfair advantage and for hackers to take control of the systems, exploiting it with ransomware and the like," vpnMentor noted in its summary of the blunder.

If there is anything Tech Data can take heart in, it is the knowledge that the enterprise IT giant is far from alone in leaving its server open to the public internet. Individual researchers and security companies have made an entire industry out of crawling blocks of IP addresses to sniff out cloud instances and servers that have not been properly configured to limit access and as a result were left open to anyone who could connect.

The solution to the issue is rather simple; check your server configurations and make sure access is limiting strictly to authorized users. That is, admittedly, easier said than done in these days of exponential cloud growth and overextended admins. ®

Send us news
30 Comments

IBM's vintage Db2 database jumps on AWS's cloud bandwagon

Users on the mainframe will have to wait for their system to become available in the cloud service, though

Couchbase takes fight to MongoDB with columnar side store upgrade

DBaaS update aimed at customers looking for live analytics on apps

Yet another UK public sector data blab, this time info of pregnant women, cancer patients

NHS Trust admits highly sensitive data left online for nearly three years

Microsoft, Databricks double act tries to sew up the data platform market

But the one-stop shop vision fails to take it far beyond the competition

BlackCat ransomware crims threaten to directly extort victim's customers

Accounting software firm Tipalti says it’s investigating alleged break-in of its systems

Hershey phishes! Crooks snarf chocolate lovers' creds

Stealing Kit Kat maker's data?! Give me a break

EU lawmakers finalize cyber security rules that panicked open source devs

PLUS: Montana TikTok ban ruled unconstitutional; Dollar Tree employee data stolen; critical vulnerabilities

Regulator says stranger entered hospital, treated a patient, took a document ... then vanished

Scottish health group to tweak security checks, access authorization to avoid a repeat

Admin of $19M marketplace that sold social security numbers gets 8 years in jail

24 million Americans thought to have had their personal data stolen and sold for pennies

Okta data breach dilemma dwarfs earlier estimates

All customer support users told their info was accessed after analysis oversight

British Library begins contacting customers as Rhysida leaks data dump

CRM databases were accessed and library users are advised to change passwords

Ukraine cyber spies claim Putin's planes are in peril as sanctions bite

Aeroflot fleet still has a smoking section, but not for tobacco