- 3,014
- 282
- 1,730
The server has been in the public domain for at least 18 months.
The research team of the CyberNews resource discovered a publicly accessible Amazon AWS server on the Internet, which contained 7 GB of unencrypted files containing 350 million unique email addresses. The database owner could not be established.
The unsecured bucket contained a total of 67 CSV files, of which 21 included both unencrypted and hashed email addresses. Based on the upload dates, these addresses were either stolen or bought on the black market in October 2018 and then gradually decrypted by the bucket owner.
According to experts, the server has been in the public domain for at least 18 months, and it is not yet clear whether it has come to the attention of the attackers. Since the researchers were unable to identify the owner of the server, they turned to Amazon. The company closed access to the server on June 10 this year.
__________________

The research team of the CyberNews resource discovered a publicly accessible Amazon AWS server on the Internet, which contained 7 GB of unencrypted files containing 350 million unique email addresses. The database owner could not be established.
The unsecured bucket contained a total of 67 CSV files, of which 21 included both unencrypted and hashed email addresses. Based on the upload dates, these addresses were either stolen or bought on the black market in October 2018 and then gradually decrypted by the bucket owner.
According to experts, the server has been in the public domain for at least 18 months, and it is not yet clear whether it has come to the attention of the attackers. Since the researchers were unable to identify the owner of the server, they turned to Amazon. The company closed access to the server on June 10 this year.
__________________