[NEWS] A mistakenly exposed password let a hacker access internal Comodo files – Loganspace

0
200
[NEWS] A mistakenly exposed password let a hacker access internal Comodo files – Loganspace


A hacker won salvage exact of entry to to internal files and paperwork owned by security company and SSL certificate issuer Comodo by using an electronic mail handle and password mistakenly uncovered on the gain.

The credentials glean been realized in a public GitHub repository owned by a Comodo machine developer. With the electronic mail handle and password in hand, the hacker turned into once ready to log into the corporate’s Microsoft-hosted cloud services and products. The story turned into once no longer safe with two-teach authentication.

Jelle Ursem, a Netherlands-based security researcher who realized the credentials, contacted Comodo vice president Rajaswi Das by WhatsApp to get the story. The password turned into once revoked the next day.

Ursem told TechCrunch that the story allowed him to salvage exact of entry to internal Comodo files and paperwork, alongside side gross sales paperwork and spreadsheets within the corporate’s OneDrive — and the corporate’s organization graph on SharePoint, allowing him to discover the crew’s biographies, contact files alongside side phone numbers and electronic mail addresses, photos, customer paperwork, calendar, and extra.

comodo calendar

A screenshot of a workers calendar on Comodo’s internal place of abode. (Image: supplied)

He additionally shared several screenshots of folders containing agreements and contracts with several customers — with the names of customers in every filename, much like hospitals and U.S. issue governments. Other paperwork gave the look to be Comodo vulnerability studies. Ursem’s cursory evaluation of the records failed to flip up any customer certificates non-public keys, on the opposite hand.

“Seeing as they’re a security company and give out SSL certificates, you’d mediate that the protection of their very comprise atmosphere would blueprint first above all else,” acknowledged Ursem.

Nonetheless in step with Ursem, he wasn’t the predominant particular person to to find the uncovered electronic mail handle and password.

“This story has already been hacked by any person else, who has been sending out junk mail,” he told TechCrunch. He shared a screenshot of a junk mail electronic mail sent out, purporting to supply tax refunds from the French finance ministry.

We reached out to Comodo for observation prior to newsletter. A spokesperson acknowledged the story turned into once an “automated story frail for marketing and transactional capabilities,” alongside side: “The records accessed turned into once no longer manipulated in any respect and internal hours of being notified by the researcher, the story turned into once locked down.”

It’s essentially the most traditional example of uncovered company passwords realized in public GitHub repositories, the place builders store code on-line. All too continually builders upload files inadvertently containing non-public credentials frail for internal-most inviting testing. Researchers fancy Ursem continually scan repositories for passwords and file them to the corporations, continuallyin switchfor worm bounties.

Earlier this yr Ursem realized a in an identical contrivance uncovered arena of internal Asus passwords on an employee’s GitHub public story. Uber turned into once additionally breached in 2016after hackers realizedinternal credentials on GitHub.

Leave a Reply