The breach originated from a misconfigured Amazon Web Services S3 bucket, exposing private files belonging to the company.

Many of these filesincluded detailed information about customers purchasing security products through SSL247.

Exactly what SSL247 is trying to prevent.

Report: Leading Internet Security Company Exposes Customers to Fraud and Attack From Hackers

Billed as Europes Leading Web Security Consultancy Firm, SSL247 started as a reseller of SSL certificates.

But rare are these times.

Most often, we need days of investigation before we understand whats at stake or whos exposing the data.

Article image

Some affected parties deny the facts, disregarding our research, or playing down its impact.

So, we need to be thorough andmake sure everything we find is correct and accurate.

For such a well-regarded company within the internet security industry to react in this way is surprising and disheartening.

Article image

We estimate up to 350,000 people and businesses in total.

Many of these files would have been publicly available, and any risk from them being exposed minimal.

They couldalso trick victims into providing credit card detailsand other sensitive, valuable information used to steal from them.

Article image

This privacy is an invaluable asset for many,including activists and political dissidents.

The negative consequences of exposing such information cannot be understated.

This is what happened to Dutch certificate authority DigiNotar in 2011.

Article image

All in the space of a few short months.

SSL247 risks losing trust from users and damage to its reputation as a result of the breach.

People may question SSL247s credentials as a result, and look to other providers when purchasing such products.

Article image

If it cant provide such information, it may lose valuable corporate relationships.

Finally,competitors will be scrutinizing this breach for an opportunity to exploit it.

Theyre usually the result of an error by the owner of the bucket.

Article image

Amazon provides detailed instructions to AWS users to help them secure S3 buckets and keep them private.

To learn about data vulnerabilities in general, read ourcomplete guide to online privacy.

Each identified weakness is then meticulously scrutinized for any indications of data exposure.

Article image

Our team was able to dive into the S3 bucket because it was misconfigured and completely unsecured.

As ethical hackers,were obliged to inform a companywhen we discover flaws in their online security.

The purpose of this web mapping project is to helpmake the internet safer for all users.

Article image

We then verify and report any submission deemed a legitimate threat to the publics safety.

We never sell, store, or expose any informationwe encounter during our security research.

This includes any information reported to us via The Leak Box.

Article image

Our ethical security research team has discovered and disclosed some of the most impactful data breaches in recent years.

[Publication date: 17.06.2020]

just, comment on how to improve this article.

Article image

Article image

Article image

Article image

Article image

Article image