Sunday, April 2, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities

    Creal Information Stealer Phish Out Cryptocurrency Users

    New Advisory on Thunderbird Vulnerability

    Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

    Hacktivism

    Hacktivism and The New Age of Cyber Warfare

    3CX

    Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

    HACLA Cyber Attack

    Here’s Everything We Know About HACLA Cyber Attack Claimed by LockBit

    Microsoft Bing Search Results

    Microsoft Bing Search Results Altered Through AAD Misconfiguration

    World Data Backup Day

    World Data Backup Day: Are You Doing it Right?

    UK on AI

    UK Government to Go Light on AI Regulation; Musk, Wozniak Call for Six-month Halt on AI

    Spyware Vendor

    Spanish Spyware Vendor’s Product Used to Target UAE Users, Finds Google

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    cybersecurity-education-legislation

    North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities

    Creal Information Stealer Phish Out Cryptocurrency Users

    New Advisory on Thunderbird Vulnerability

    Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

    Hacktivism

    Hacktivism and The New Age of Cyber Warfare

    3CX

    Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

    HACLA Cyber Attack

    Here’s Everything We Know About HACLA Cyber Attack Claimed by LockBit

    Microsoft Bing Search Results

    Microsoft Bing Search Results Altered Through AAD Misconfiguration

    World Data Backup Day

    World Data Backup Day: Are You Doing it Right?

    UK on AI

    UK Government to Go Light on AI Regulation; Musk, Wozniak Call for Six-month Halt on AI

    Spyware Vendor

    Spanish Spyware Vendor’s Product Used to Target UAE Users, Finds Google

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    cybersecurity-education-legislation

    North Dakota Approves Computer Science and Cybersecurity Education Legislation for K-12 Grades

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    CISA

    13 Specialists to Join Forces with CISA’s Cybersecurity Advisory Committee

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

3TB of Thomson Reuters Data Exposed

Vishwa Pandagle by Vishwa Pandagle
October 28, 2022 - Updated on February 15, 2023
in Firewall Daily, Main Story
0
Thomson Reuters corporation
588
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

Three terabytes of data from multiple servers of Canadian multinational media conglomerate Thomson Reuters corporation was left exposed online. Researchers at Cybernews discovered the data that included 6.9 million unique logs with corporate and legal data. The data from the exposed servers were taken down after the researcher contacted the news media giant.

What was found?

Researchers maintained that finding the exact amount of data that was exposed was impossible without ‘crossing the ethical boundaries’. The discovered samples indicated that the data was logged recently, with some of it being published on October 26. Moreover, the exposed 3TB of sensitive data, worth millions of dollars on underground criminal forums, was visible in plaintext or readable format, making it understandable for anyone who finds it. The data included:

You might also like

Fake Accounts Are a Bigger Problem Than Businesses Realize

Creal Information Stealer Phish Out Cryptocurrency Users

Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

  1. Individuals and organizations’ sensitive screening information
  2. Login credentials and reset logs
  3. Email addresses
  4. Time of password change query
  5. Structured query language (SQL) logs of searched data by Thomson Reuters’ clients
  6. Legal information of some businesses and individuals
  7. Internal screening of YouTube
  8. Connection strings to databases

Investigation into the secure sockets layer (SSL) certificate of the web servers, domain name system (DNS) system, and ElasticSearch instance revealed that the data belonged to Thomson Reuters corporation. The databases were exposed publicly since October 21.

The three servers of Thomson Reuters Corporation

Reuters representative spoke with the publication about their immediate response to the incident and said, “Upon notification, we immediately investigated the findings provided by Cybernews regarding the three potentially misconfigured servers.” However, the organization maintained that the two servers were designed to be accessible to people. And the third one is a non-production server for the ‘ONESOURCE’ global trade product, which is one of the company’s products. Moreover, the third server stores application logs linked to a small subset of customers.

How was the data exposed?

Researchers believe that the information became public due to a misconfiguration of the AWS Elastic load balancing service. It followed different rules that were not configured well to tackle access control rules which perhaps led to the exposing of company data.

Researchers argued that such information could have allowed cybercriminals to launch phishing attacks, impersonate individuals to commit other frauds, send fake company invoices for monetary fraud, extort the business on some levels, launch ransomware attacks, gain more access and data, etc.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: cybernewsData ExposedReuter 3TBThe Cyber ExpressThe Cyber Express NewsThomson Reuters
Previous Post

Possible Connection Between LV and REvil Ransomware Gangs

Next Post

How to Protect Yourself From a Cybersecurity Nightmare This Halloween

Vishwa Pandagle

Vishwa Pandagle

Vishwa Pandagle is a Technical Writer at The Cyber Express. She writes cybersecurity news related to data breaches, ransomware, phishing, and best practices among others. She also writes about cybersecurity developments and likes interacting with experts in this field. When not working, she likes self-reflecting, meditating, volunteering, and going for long walks.

Related Posts

Fake Accounts
Features

Fake Accounts Are a Bigger Problem Than Businesses Realize

by Editorial
April 2, 2023
Firewall Daily

Creal Information Stealer Phish Out Cryptocurrency Users

by Vishwa Pandagle
April 1, 2023
New Advisory on Thunderbird Vulnerability
Firewall Daily

Mozilla Foundation Releases New Advisory on Thunderbird Vulnerability

by Ashish Khaitan
April 1, 2023
Hacktivism
Firewall Daily

Hacktivism and The New Age of Cyber Warfare

by Editorial
April 1, 2023
3CX
Cybersecurity News

Global 3CX Telephone App Users at Risk, CEO Blames ‘Upstream Library’

by Chandu Gopalakrishnan
March 31, 2023
Next Post
How to Protect Yourself From a Cybersecurity Nightmare This Halloween

How to Protect Yourself From a Cybersecurity Nightmare This Halloween

Latest Issue is Out. Subscribe Now

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.