Original Article Text

Click to Toggle View

Code beautifiers expose credentials from banks, govt, tech orgs. Thousands of credentials, authentication keys, and configuration data impacting organizations in sensitive sectors have been sitting in publicly accessible JSON snippets submitted to the JSONFormatter and CodeBeautify online tools that format and structure code. Researchers discovered more than 80,000 user pastes totaling over 5GB exposed through a feature called Recent Links provided by both services, which is freely accessible to anyone. Some of the companies and organizations with sensitive data leaked this way are in high-risk sectors like government, critical infrastructure, banking, insurance, aerospace, healthcare, education, cybersecurity, and telecommunications. Saving secrets online Researchers at external attack surface management company WatchTowr examined the JSONFormatter and CodeBeautify online platforms and found that their Recent Links feature provided access to JSON snippets that users had saved on the services' servers for temporary sharing purposes. When clicking the 'save' button, the platform generates a unique URL pointing to that page and adds it to the user’s Recent Links page, which has no protection layer, thus leaving the content accessible to anyone. Since Recent Links pages follow a structured, predictable URL format, the URL can be easily retrieved with a simple crawler. Level of exposure By scraping these public “Recent Links” pages and pulling the raw data using the platforms’ getDataFromID API endpoints, watchTowr collected over 80,000 user pastes corresponding to five years of JSONFormatter data and one year of CodeBeautify data with sensitive details: In one case, the researchers found "materially sensitive information" from a cybersecurity company that could be easily identified. The content included "encrypted credentials for a very sensitive configuration file," SSL certificate private key passwords, external and internal hostnames and IP addresses, and paths to keys, certificates, and configuration files. Pastes from a government entity included 1,000 lines of PowerShell code that configured a new host by fetching installers, "configuring registry keys, hardening configurations, and finally deploying a web app." Even if the script did not include sensitive data, watchTowr says that it had valuable information that an attacker could use, such as details about internal endpoints, IIS configuration values and properties, and hardening configurations with the corresponding registry keys. A technology company providing Data Lake-as-a-Service (DLaaS) products exposed a configuration file for cloud infrastructure, complete with domain names, email addresses, hostnames, and credentials for Docker Hub, Grafana, JFrog, and RDS Database. The researchers also found valid production AWS credentials from a "major financial exchange" that were associated with Splunk SOAR automation. A managed security service provider (MSSP) leaked the Active Directory credentials for its environment, as well as email and ID-based credentials for a bank in the U.S., which watchTowr describes as "the MSSP’s largest, most heavily advertised client." As threat actors are constantly scanning for sensitive information on easy-to-access systems, watchTowr wanted to see if any attacker was already scanning the publicly available JSONs. To this end, they used the Canarytokens service to generate fake but valid-looking AWS access keys and planted them on the JSONFormatter and CodeBeautify platforms in JSONs accessible through links set to expire in 24 hours. However, the researchers' honeypot system recorded access attempts using the fake keys 48 hours after the initial upload and save. "More interestingly, they were tested 48 hours after our initial upload and save (for those mathematically challenged, this is 24 hours after the link had expired and the 'saved' content was removed)," watchTowr says in the report. watchTowr emailed many of the affected organizations, and while some remediated the issues, many did not respond. Currently, the Recent Links are still freely accessible on the two code-formatting platforms, allowing threat actors to scrape the resources for sensitive data. 7 Security Best Practices for MCP As MCP (Model Context Protocol) becomes the standard for connecting LLMs to tools and data, security teams are moving fast to keep these new services safe. This free cheat sheet outlines 7 best practices you can start using today.

Daily Brief Summary

DATA BREACH // Public Code Tools Expose Sensitive Data from Key Sectors

Researchers identified over 80,000 user pastes exposing credentials and sensitive data from sectors like government, banking, and healthcare via JSONFormatter and CodeBeautify platforms.

The data, totaling over 5GB, was accessible through the platforms' Recent Links feature, which lacks proper security measures, allowing public access to sensitive information.

Exposed data included encrypted credentials, SSL certificate passwords, and sensitive configuration files from major companies and government entities.

A technology company inadvertently leaked a cloud infrastructure configuration file, revealing domain names, email addresses, and credentials for various services.

A financial exchange's production AWS credentials were found, posing a significant risk if exploited by threat actors.

WatchTowr's honeypot experiment confirmed that threat actors are actively scanning these platforms, with fake AWS keys accessed even after link expiration.

Despite notifications, many affected organizations have not addressed the vulnerabilities, leaving their data at risk.

Organizations are urged to review their data handling practices on public platforms and implement stronger access controls to prevent similar exposures.