AWS, Google Cloud, PayPal, Slack, and Stripe Exposed by Apache Airflow Flaw

  • By Dawna M. Roberts
  • Published: Oct 07, 2021
  • Last Updated: Mar 18, 2022

On Monday, threat assessors discovered that some older versions of Apache Airflow contained a flaw that leaked a good amount of sensitive information from some large corporations. Unfortunately, the data leak exposed some high-level credentials for platforms such as Amazon Web Services (AWS), Binance, Google Cloud Platform (GCP), PayPal, Slack, and Stripe.

What Happened?

Intezer threat researchers told The Hacker News on Monday that dozens of misconfigured Apache Airflow instances exposed information from some high-profile companies.

The Hacker News explains,

“These unsecured instances expose sensitive information of companies across the media, finance, manufacturing, information technology (IT), biotech, e-commerce, health, energy, cybersecurity, and transportation industries.”

 

“Originally launched in June 2015,  Apache Airflow is an open-source workflow management platform that enables programmatic scheduling and monitoring of workflows on AWS, GCP, Microsoft Azure, and other third-party services. It’s also one of the most popular task orchestration tools, followed by Luigi, Kubeflow, and MLflow.”

The problems that Intezer discovered were mainly in reference to the practice of hard-coding database passwords into variables or “Extra” fields within the pages exposing them to hackers. If a bad actor were to get ahold of these credentials, it could easily lead to intrusion into the corporate network or other cyberattacks.

The Hacker News expands on this,

“If a large number of passwords are visible, a threat actor can also use this data to detect patterns and common words to infer other passwords,” Intezer researchers said. “These can be leveraged in a dictionary or brute-force-style attacks against other platforms.”

 

Apache Airflow Flaw Exposed

Another primary concern is that hackers could potentially use the credentials to gain access and install malware or ransomware, further compromising already weak systems to exfiltrate data or extort funds. 

What is the Danger?

Due to the flaw identified by Intezer, the following platforms are vulnerable to exposed login credentials:

  • AWS.
  • WhatsApp.
  • Dremio.
  • Binance.
  • MySQL.
  • PayPal.
  • POSTMAN.
  • Google Drive.
  • Klarna.
  • Stripe.
  • PostgreSQL.
  • Bing ads.
  • Facebook.
  • Slack.
  • Node.

These applications, among others, remain at risk for misconfigured instances of Apache Airflow if not updated immediately. 

What is Apache Airflow?

According to its website, Apache Airflow is a “platform created by the community to programmatically author, schedule, and monitor workflows.” In December 2020, Airflow received an update, patching dozens of security issues. The platform notified users of the importance of upgrading to the latest version. 

Apache Airflow is open-source, which is great for the community but can leave the door open for hackers to taint the source code and install backdoors. Additionally, Airflow integrates easily with many Google programs and MS Azure making those systems vulnerable if the app remains misconfigured. 

How Can Businesses Stay Safe?

Most organizations utilize various cloud-based solutions to run business operations these days. However, this reliance on third-party tools can put companies at significant risk of exposure, ransomware, and other cyberattacks.

Some of the ways businesses can stay safe are:

  • Vet any third-party vendor thoroughly before investing company resources in it.
  • Always keep your apps and operating systems up to date with the latest security patches.
  • Install network monitoring software to scan for any intrusions 24/7.
  • Keep good, robust antivirus software running on all servers and workstations.
  • Implement strict password policies and access management tools. 
  • Train staff on phishing tactics and social engineering techniques, so they know what to avoid. 
  • Stay on top of any data breaches and notifications from software vendors of vulnerabilities or flaws that need addressing.
  • Remain vigilant and understand that hackers are working overtime, and you as a business owner need to as well just to keep up and stay safe.
About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

How to Recognize and Avoid Publishers Clearing House Scams

How to Recognize and Avoid Publishers Clearing House Scams

The Publishers Clearing House (PCH) appeared in 1967, promoting magazine subscriptions, merchandise, time-share vacations, and their famous cash prize sweepstakes.

What is a Time Theft and How to Prevent It

What is a Time Theft and How to Prevent It

Time theft happens when employees dishonestly use their paid work hours for personal activities or tasks unrelated to work. Time fraud significantly impacts an organization's productivity, business strategy, finances, and employee morale.

What is MLM? What are the red flags of MLM scams?

What is MLM? What are the red flags of MLM scams?

MLM (multi-level marketing) business models are believed to have existed since the 1920s - it is estimated that approximately over 1,000 companies in the US currently use this model.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close