DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Get Help
CyberMaterial
Home Incidents

Exposed server leaks sensitive US military emails for two weeks

February 23, 2023
Reading Time: 2 mins read
in Incidents

 

The U.S. Department of Defense has secured an exposed server that had been leaking internal U.S. military emails to the open internet for two weeks. The server was hosted on Microsoft’s Azure government cloud for Department of Defense customers, which is used to share sensitive but unclassified government data. The server was part of an internal mailbox system containing about three terabytes of internal military emails, many of which pertained to U.S. Special Operations Command. The misconfiguration left the server without a password, allowing anyone on the internet access to sensitive mailbox data using only a web browser and the IP address.

Good-faith security researcher Anurag Sen discovered the exposed server over the weekend and provided details to TechCrunch, which alerted the U.S. government. The server contained internal military email messages dating back years, some of which contained sensitive personnel information, including a completed SF-86 questionnaire that contains highly sensitive personal and health information for vetting individuals before they are cleared to handle classified information. These personnel questionnaires contain a significant amount of background information on security clearance holders valuable to foreign adversaries.

None of the limited data seen by TechCrunch appeared to be classified, which would be consistent with USSOCOM’s civilian network as classified networks are inaccessible from the internet. The mailbox server was first detected as spilling data on February 8, according to a listing on Shodan, a search engine that crawls the web for exposed systems and databases. It is not clear how the mailbox data became exposed to the public internet, but it is likely due to a misconfiguration caused by human error.

An investigation began on Monday and is currently underway. A senior Pentagon official confirmed they had passed details of the exposed server to USSOCOM. The spokesperson did not say whether the Department of Defense had the technical ability to detect any evidence of improper access or data exfiltration from the database during the two-week window that the cloud server was accessible from the internet.

Read More
Tags: AzureData BreachData exposedDepartment of defenseEmailsFebruary 2023GovernmentincidentsIncidents 2023MicrosoftMilitaryUnited States
0
VIEWS
ADVERTISEMENT

Related Posts

KillNet Anonymous Sudan targets Australia

KillNet Anonymous Sudan targets Australia

March 30, 2023
Pakistan’s Supreme Court website attacked

Pakistan’s Supreme Court website attacked

March 30, 2023
SafeMoon liquidity pool hacked, $8.9M stolen

SafeMoon liquidity pool hacked, $8.9M stolen

March 30, 2023
DarkBit sells data from Israeli university

DarkBit sells data from Israeli university

March 30, 2023

More Articles

Analyst

CompTIA CySA+ Study Guide Exam CS0-002

November 22, 2021
Book

The Zero Trust Framework – Book

March 28, 2023
Alerts

Airspan Networks security advisory

February 3, 2022
Alerts

[Control Systems] Schneider Electric Security Advisory

October 12, 2021

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.