Cybersecurity Researcher, Jeremiah Fowler, found and reported to vpnMentor a couple of non-password-protected database that contained almost 8 million data belonging to a UK-based software program firm that facilitates worker information administration, compliance, timesheets, and payroll.
The publicly uncovered database was not password-protected or encrypted. It contained 7,975,438 information with a complete measurement of 1.1 TB. The data included pictures and.PDF information containing work authorization paperwork, nationwide insurance coverage numbers, certificates, digital signatures, timesheets, person pictures, and government-issued identification paperwork. The database additionally contained 656 listing entries indicating completely different firms, most of which have been healthcare suppliers, recruiting companies, or non permanent employment companies.
The title of the database and its inner information indicated they belonged to Logezy — an worker administration and monitoring software program firm based mostly within the UK. I instantly despatched a accountable disclosure discover to Logezy, and shortly after the database was restricted from public entry and not accessible. Though the data belonged to Logezy, it’s not recognized if the database was owned and managed immediately by them or by a third-party contractor. Additionally it is not recognized how lengthy the database was uncovered earlier than I found it or if anybody else might have gained entry to it. Solely an inner forensic audit might establish extra entry or doubtlessly suspicious exercise.
In response to their web site, the Logezy Workers Administration Software program is a cloud-based resolution designed for organizations managing each everlasting and non permanent employees. The software program gives options aimed to streamline the deployment of staff, funds, and billing or invoicing with minimal or no paperwork. The platform additionally claims to simplify worker information administration, compliance checks, timesheets, and payroll utilizing a digital system. The Logezy cell app is offered on each the Android Play Retailer and the Apple App Retailer. Though they declare to serve companies throughout numerous industries, it needs to be famous that, in a restricted pattern, all the data I noticed pertained to the healthcare sector and healthcare staff.
There are quite a few potential dangers with any information publicity linked to the healthcare business. In response to a report in Digital Health, an estimated 79% of healthcare suppliers within the UK have skilled no less than one information breach since 2021, with a 22% year-over-year enhance in reported breaches by healthcare IT professionals. Moreover, the report acknowledged there was a 14% rise in unintentional information leaks attributable to workers.
It’s no secret that healthcare information is a useful commodity to cyber criminals, however so is the PII of those that work within the healthcare business. The uncovered data — together with authorization paperwork, nationwide insurance coverage numbers, certificates, and identification paperwork — include a wealth of knowledge that may very well be exploited or doubtlessly used for quite a lot of malicious functions. I’m not saying that these people are or have been susceptible to most of these potential threats, I’m solely highlighting real-world situations to boost consciousness and for academic functions.
Potential dangers might embody:
- Id Theft: Private information that’s publicly uncovered within the type of identification paperwork, nationwide insurance coverage numbers, or employment information can pose critical potential dangers. Criminals might try and assume the id of healthcare staff figuring out they’ve steady employment and probably good credit score, making them a excessive worth goal. This could doubtlessly result in monetary fraud, with criminals opening accounts or taking out loans within the sufferer’s title. A 2023 FICO report revealed that roughly 1.9 million shoppers within the UK (4.3%) reported having their id stolen and used to open monetary accounts with out their consent.
- Credential Theft: The publicity of labor credentials, digital signatures, and certification information might doubtlessly result in unauthorized entry to inner healthcare techniques. Though many of the people I noticed have been frontline staff, some paperwork included the names of supervisors or directors. Concentrating on healthcare personnel additional up the chain of command might enhance the hypothetical dangers of criminals making an attempt to steal delicate affected person information or entry different delicate inner sources.
- Social Engineering Assaults: There is no such thing as a definitive reply to how huge of a job the human issue performs in cyber assaults, however it’s estimated that social engineering accounts for about 70%-90% of all cyberattacks. Cybercriminals typically use private info gathered from healthcare staff to hold out social engineering assaults, the place they manipulate employees or different people within the group to offer entry to techniques or information. For instance, by figuring out an worker’s place, work location, or colleagues, attackers can craft convincing phishing messages. In 2023 it was reported that social engineering assaults within the healthcare business elevated by 279% from the earlier yr.
- Ransomware Assaults: Any uncovered or misconfigured cloud storage database has a variety of potential dangers, however none as harmful to enterprise operations as ransomware. Cybercriminals can lock techniques, encrypt, and even delete information and demand a fee (normally in crypto) in trade for unlocking or recovering information. Many healthcare organizations depend on their digital techniques to offer needed medical care — having no entry to these data offers rise to critical potential dangers that will endanger sufferers’ lives. Though Logezy shouldn’t be a healthcare supplier, it seems that they supply information and companies for a substantial variety of healthcare organizations and course of massive quantities of private information, together with fee and monitoring of staff of healthcare organizations, which cybercriminals might doubtlessly exploit for this goal. In response to the Workplace of the Director of Nationwide Intelligence within the US, assaults in opposition to the healthcare sector have been up 128% in 2023 in comparison with the earlier yr.
- Threats to PII and Private Knowledge: Id info might be bought on the black market or the darkish internet, the place it may very well be doubtlessly used for numerous forms of fraud or felony actions. Cybercriminals might doubtlessly use the uncovered healthcare employee information to create faux IDs or to interact in unlawful actions utilizing the id of people affected by the information publicity. Quite a few reviews estimate that a person’s private info is estimated to be price between £800 and £1,000 on the darkish internet, whereas cast identification paperwork (utilizing actual paperwork as a template) could also be priced for as a lot as £4,500.
In the event you imagine your private info might have been uncovered, I like to recommend you monitor your accounts and credit score reviews to establish any suspicious exercise or unauthorized makes an attempt to make use of your info. |
Workers administration software program is extraordinarily useful for organizations to streamline their processes and doc administration. Nevertheless, when the builders of content material administration companies accumulate and retailer the information of a number of organizations or companies in a single centralized location, it could possibly enhance the potential dangers of cross-client information leaks. I like to recommend builders and companies that accumulate information from a number of companies to phase these data in separate cloud storage environments to reinforce safety, stop unauthorized entry, and decrease the impression of potential information breaches. By isolating every enterprise’s information via logical or bodily separation software program, suppliers can keep away from placing all of their eggs in a single basket.
On this case, the businesses have been in separate non-password-protected folders, however all paperwork contained in the folders have been publicly accessible. As a greatest observe, I’d suggest utilizing completely different databases with separate entry controls. Having structured segmentation and encrypting these data is an effective first step to make sure the information is protected, as safety threats might be managed inside remoted environments.
I indicate no wrongdoing by Logezy, or its workers, brokers, contractors, associates, and/or associated entities. I don’t declare that any inner, buyer, or person information was ever at imminent threat. The hypothetical data-risk situations I’ve offered on this report are strictly and completely for academic functions and don’t mirror, counsel, or indicate any precise compromise of information integrity. It shouldn’t be construed as a mirrored image of or commentary on any group’s particular practices, techniques, or safety measures.
As an moral safety researcher, I don’t obtain the information I uncover. I solely take a restricted variety of screenshots as needed and solely for verification functions. I don’t conduct any actions past figuring out the safety vulnerability and notifying the related events. I disclaim any and all legal responsibility for any and all actions that could be taken because of this disclosure. I publish my findings to boost consciousness of points of information safety and privateness. My intention is to encourage organizations to proactively safeguard delicate info in opposition to unauthorized entry.
Ely Rodriguez