The popular web hosting service, DepositFiles, faced a cyber attack when its environment configuration file was left accessible, revealing highly sensitive credentials. The leak included Redis database credentials, payment system credentials, and social media account details.
This data breach poses significant risks to the privacy of DepositFiles’ users and the company itself, leaving them vulnerable to potential ransomware attacks, unauthorized access to financial systems, and compromised communication channels. The exposed information could also be used to initiate distributed denial-of-service attacks or fraudulent transactions, causing severe financial losses and damage to the company’s reputation.
DepositFiles’ data exposure emerged as the research team discovered the config file containing crucial information for the system to operate effectively in a specific environment.
Unfortunately, the leak placed the company and its users at risk of having their personally identifiable information and passwords stolen by attackers. The cybercriminals could potentially exploit this information to disrupt DepositFiles’ official communication channels, including social media accounts and support emails, complicating the process of addressing data breaches or warning users of potential malware attacks. With credentials for critical databases, email services, and payment systems accessible, the attack could lead to data manipulation, unauthorized access, and phishing attempts, endangering the confidentiality and security of users’ files and personal information.
The leaked data exposed not only sensitive credentials for databases and payment systems but also Twitter, Facebook, and VKontakte social media account details, giving potential attackers control over the company’s online presence.
Additionally, the company’s Google App ID and Secret were exposed, which could grant unauthorized access to DepositFiles’ Google services and APIs, posing further risks to sensitive data and system integrity. The config file also included credentials for the payment service used by DepositFiles, allowing cybercriminals to perform unauthorized transactions and access sensitive payment data.
Furthermore, the publicly accessible config file contained information about app IDs, including DF Android and iOS, as well as salt values and PHP unit client details, potentially enabling attackers to create malicious API calls and gain unauthorized access to resources or undertake illicit activities.