40+ Apps Leaking AWS Keys

  • By Dawna M. Roberts
  • Published: May 12, 2021
  • Last Updated: Mar 18, 2022

CloudSEC security intelligence created a tool called BeVigil which identified 40+ apps with more than 100 million installs that were found to be leaking AWS keys all over the place. 

How Did This Happen?

AWS Keys Leak

The Hacker News reported this week that cybersecurity company CloudSEC identified 40+ apps with hardcoded Amazon Web Services (AWS) keys in them using their recently created BeVigil platform. The tool is designed to help users investigate apps before they install them. BeVigil checks security ratings and other findings and notifies users with a warning if they are found to be insecure.

Some of the apps that were found to have leaky AWS keys were:

BeVigil’s search engine tested more than 10,000 apps for security vulnerabilities. 

CloudSEC said:

“AWS keys hardcoded in a mobile app source code can be a huge problem, especially if its [Identity and Access Management] role has wide scope and permissions. The possibilities for misuse are endless here since the attacks can be chained, and the attacker can gain further access to the whole infrastructure, even the code base, and configurations.”

CloudSEC did notify Amazon Web Services and other vendors that their apps were leaking AWS keys with possible hacking repercussions. 

The Larger Issue

A Bengaluru cybersecurity company analyzed one of the apps finding that the AWS keys led to the access of multiple other AWS services such as credentials for S3 storage buckets, files, and data. One such example led to 88 buckets, 10,073,444 files, and data totaling 5.5 TB. Researchers also found backups, source code, configuration files, test artifacts, and user databases along with these items.

The potential for misuse and exploitation here is huge. Many of the major data breaches to date have begun with a misconfigured or vulnerable AWS S3 bucket containing private data. Some examples are cybersecurity firm Imperva whose migrated customer database was misconfigured and suffered an attack in 2019. This year, trading and stock exchange Upstox was hacked by a group named ShinyHunters that accessed its AWS S3 storage buckets (that were misconfigured).

CTO of BeVigil, Shahrukh Ahmad commented that “Hardcoded API keys are like locking your house but leaving the key in an envelope labeled ‘Do not open.’” These keys could easily be discovered by malicious hackers or competitors who could use them to compromise their data and networks.”

What is BeVigil?

According to The Hacker News, “BeVigil is a mobile security search engine that allows researchers to search app metadata, review their code, view security reports and Risk Scores, and even scan new APKs.”

Users want to be assured that the mobile apps they use are safe and won’t expose their data to strangers. 

Threat researchers can use the tool to search for code snippets (from known malware) and keywords to examine apps deeper, looking for any vulnerabilities before they download and use them on their device.

The Hacker News lists how you can use the tool to find a list of apps: 

  • “From an organization,

  • above or below a certain security score; e.g., credit apps with security score 7,

  • released within a certain time period (select “from” and “to” dates); e.g., identify credit apps released in 2021,

  • from 48 different categories such as finance, education, tools, health & fitness, etc.,

  • from a specific developer by searching with the developer email address,

  • developed in a specific country by searching; for example, identify banking apps from Germany,

  • developed in a specific location by searching with the pin code or developer email address,

  • that record audio in the background,

  • that record location in the background,

  • that can access the camera device,

  • that can access specific permission on your device,

  • with a specific target SDK version.”

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close