HackDig : Dig high-quality web security articles for hackers

Research Finds Nearly 800,000 Access Keys Exposed Online

2020-09-15 16:45
The keys were primarily for access to databases and cloud services.

When AWS keys were exposed in GitHub repositories, GitHub responded by invalidating those keys. Researchers at Digital Shadows have found that this proper action doesn't end the issue of exposed keys as they have found almost 800,000 keys available on the Web.

Related Content:

What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?

Special Report: Computing's New Normal, a Dark Reading Perspective

New on The Edge: Think You're Spending Enough on Security?

The researchers searched approximately 150 million entities across GitHub, GitLab, and Pastebin during a 30-day period in August and September to find the roughly 800,000 keys. They discovered that more than 40% of the keys were database keys while 38% were for cloud services. Redis was the most common database involved, while Google Cloud API was the most common cloud service key.

In their blog post on the research, Digital Shadows notes three services — Trufflehog, GitRob, and GitHub Secret Scanning — that can help organizations search for their own keys that might have been exposed online.

For more, read here.


Source: sopxe-syek-ssecca-000008-ylraen-sdnif-hcraeser/staerht---seitilibarenluv/moc.gnidaerkrad.www

Read:136 | Comments:0 | Tags:No Tag

“Research Finds Nearly 800,000 Access Keys Exposed Online”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud