Readily available information included 211 system employees' access credentials, contacts’ email addresses, Social Security numbers, and the organization's registered sources. Researchers found the files stored in an Amazon S3 bucket subdomain labeled “lacounty.” And while not all the stored files were downloadable, around 200,000 rows of CSV exports and Postgres database backups of data were exposed. A misconfigured Amazon AWS S3 storage bucket leaked downloadable databases containing rows of information concerning their employees, informants, and persons in need as the settings were programmed to be public and anonymously accessible. Security researchers discovered LA-based non-profit organization Los Angeles County 211 accidentally exposed approximately 3.5 million records, including personally identifiable information (PII) and call notes logged between 20.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |