Article Details
Scrape Timestamp (UTC): 2024-06-21 05:41:25.596
Source: https://www.theregister.com/2024/06/21/optus_data_breach_faulty_api/
Original Article Text
Click to Toggle View
Coding error in forgotten API blamed for massive data breach. Australian telco Optus allegedly left redundant website with poor access controls online for years. The data breach at Australian telco Optus, which saw over nine million customers' personal information exposed, has been blamed on a coding error that broke API access controls, and was left in place for years. A Wednesday court filing [PDF] includes an account of the incident penned by Australia's Communications and Media Authority (ACMA), which is using its regulatory powers to pursue Optus. The Authority alleges that Optus stored customer info and made it accessible to authenticated customers at www.optus.com.au and api.optus.com.au – described as the "Main" and "Target" domains. Retrieving that info required use of APIs that the filing describes as "Target APIs." The Target domain existed to segregate API traffic from static content at the Main domain, and had been internet-facing since 2017. The Target APIs were secured by "various access controls designed to prevent unauthorized access." But in 2018 a coding error broke one of those access controls, and meant it didn't work on either the Target or Main domain. Optus spotted that error … in 2021, when it fixed it – but only for the Main domain. The problem was not detected on the Target domain, and therefore wasn't fixed. The Target domain, however, remained online and internet-facing. The court filing suggests it "was not decommissioned despite a lack of any need for it." In September 2022, an attacker "was able to bypass access controls and send requests to the Target APIs." Doing so returned customer information for 9.5 million people – and sent Optus and its Singaporean owner, Singtel, into a world of pain. The filing offers the following assessment of the incident: "The cyber attack was not highly sophisticated or one that required advanced skills or proprietary or internal knowledge of Optus's processes or systems. It was carried out through a simple process of trial and error." There but for the grace of Git goes many a reader, we suspect. Optus has not disputed the account of the attack. ACMA is seeking civil penalties in the case. Singtel has advised [PDF] investors it can't determine the quantum of penalties but will defend the case.
Daily Brief Summary
An Australian telco Optus experienced a significant data breach revealing personal information of over 9 million customers due to a coding error in an API.
The breach occurred because a redundant website's API, which had been left accessible online since 2017, had flawed access controls from a 2018 coding mistake.
Optus recognized and corrected the error on their main domain in 2021, but failed to address the issue on the target domain that was compromised.
The compromised API allowed unauthorized access simply through trial and error, indicating the breach did not require sophisticated hacking skills.
Australia's Communications and Media Authority (ACMA) is pursuing legal action against Optus, demanding civil penalties for the negligence.
Although the redundant website and API had no practical utility, they were not decommissioned, leading to the vulnerability.
Singtel, owner of Optus, expressed to investors the inability to estimate potential financial penalties but plans to defend against the claims.