Mon. Jan 24th, 2022

What appears to be a malicious breach in one of Seger’s servers seems to have been shut down Report By security agency VPN Overview. The incorrectly configured Amazon Web Services S3 bucket contains sensitive information that allows researchers to arbitrarily upload files across a large portion of Sega-owned domains, as well as certificates to abuse the 250,000-user email list.

Affected domains included the official landing pages of major franchises, including Sonic the Hedgehog, Bayonetta and Total War, as well as the site itself. VPNO was able to run executable scripts on these sites that you can imagine, if this breach had been discovered by malicious actors instead of researchers it would have been pretty bad.

An incorrectly saved Mailchimp API key granted VPNO access to the aforementioned email list. The emails, along with the corresponding IP address and password, were available in plain text that researchers were able to un-hash. According to the report, “a malicious user can distribute ransomware very effectively using SEGA’s compromised email and cloud services.”

So far there is no indication that bad actors used this vulnerability before VPNO was invented and helped Sega fix it. Sega Europe was not available for comment.

Incorrectly configured S3 buckets are, unfortunately, a very common problem in terms of data security. Similar errors have affected audio companies this year Sennheiser, Senior Advisor, PeopleGIS, And the government Ghana. Sega was a target Big attack In 2011 it revealed the personally identifiable information of 1.3 million users. Fortunately, this misconfigured European server did not result in a similar incident.

All products offered by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you purchase something through one of these links, we may receive an approved commission.

Source link

By admin

Leave a Reply

Your email address will not be published. Required fields are marked *