Twitter | Search | |
Bob Diachenko
Cyber Threat Intelligence, OSINT, | Responsible disclosures | Security consultancy | Contact me: bob@securitydiscovery.com
876
Tweets
579
Following
5,989
Followers
Tweets
Bob Diachenko Sep 13
Reply Retweet Like
Bob Diachenko Sep 13
Replying to @MayhemDayOne
Reply Retweet Like
Bob Diachenko Sep 13
[NEW REPORT] Here are more details on what happened with Bold[.]com server and what data ended up online:
Reply Retweet Like
Bob Diachenko Sep 12
exposed its Elasticsearch-based internal infrastructure with dev tickets, incl. passwords/logins to newly acquired platforms. This is how one of their Jenkins instances look like now.
Reply Retweet Like
Bob Diachenko Sep 7
My tweet from Aug 15 was all about that Facebook phones database... ;)
Reply Retweet Like
Bob Diachenko Sep 7
[HELP SECURE] Large Italian online shop exposing 400K+ customers accounts, incl. names, phones, VAT and Tax numbers (equivalent to SSN in the US), emails, addresses. No response for a week. IT CERT? Industry contacts anyone?
Reply Retweet Like
Bob Diachenko Aug 26
[NEW REPORT] Gartner told me database contained data from public sources but even that type of things should be left open. Oh, and that "Diversity" field + API key:
Reply Retweet Like
Bob Diachenko Aug 21
1TB+ of "publicly sourced data" sometimes has more value than PII, especially when it is a -related database.
Reply Retweet Like
Bob Diachenko Aug 20
Another selection of carefully collected business data has made its way online. Almost 10M of US-targeted records like this exposed in a security incident and now hi-jacked by Unistellar gang.
Reply Retweet Like
Bob Diachenko Aug 20
A French healthcare media group exposed internal database with 500K+ personal profile records: name, email, address, position, phone. The following statement was provided:
Reply Retweet Like
Bob Diachenko Aug 19
[UPDATE] exposed another database after similar incident reported by me earlier in May. No reply from company.
Reply Retweet Like
Bob Diachenko Aug 19
[IN SHORT] It's double painful to see when a security company exposes auth and clients data. apparently misconfigured its db earlier this month, now silently pulled offline, no word received. "Case studies"-companies data was compromised.
Reply Retweet Like
Bob Diachenko Aug 19
Do I have security team reps among my followers or beyond? Thanks for pointing out to the right person!
Reply Retweet Like
Bob Diachenko Aug 19
Replying to @campuscodi
One of the US-based home internet service provider's open ES clusters
Reply Retweet Like
Bob Diachenko Aug 19
Replying to @zackwhittaker
already did! interesting if it bounces back or..
Reply Retweet Like
Bob Diachenko Aug 19
Wondering if somebody else spotted it too
Reply Retweet Like
Bob Diachenko Aug 15
Please remind me - is the combination of a Facebook UID, phone number, name and partial address (country, state) considered to be sensitive data?
Reply Retweet Like
Bob Diachenko Aug 15
Replying to @ranlocar
me too, just guessing. need to ask that question to dev guys responsible for the exposure. Wondering if BioStar were completely non responsive?
Reply Retweet Like
Bob Diachenko Aug 15
Replying to @ranlocar
yeah, I'm pretty sure they are the same, cloned for some reason unknown ("testing purposes" they usually say haha)
Reply Retweet Like
Bob Diachenko Aug 15
Another interesting and non-reported aspect of BioStar data exposure - Both Elasticsearch clusters contained Readme file with ransom demand
Reply Retweet Like