- UPS facing backlash for thanking police after employee killed in shootout Saturday 5:02 PM
- Sanders campaign fires staffer after anti-Semitic, homophobic tweets surface Saturday 3:13 PM
- Brother Nature was attacked, says everyone just watched with phones out Saturday 2:45 PM
- Ryan Reynolds’ gin company hires Peloton wife for ad Saturday 1:24 PM
- Ex-vegan YouTuber accused of fraud after following meat-only diet Saturday 1:11 PM
- The 15 best Disney+ hidden gems and deep cuts Saturday 12:23 PM
- Everyone in GoFundMe scam involving homeless veteran has now pleaded guilty Saturday 12:06 PM
- Boy invites kindergarten class to his adoption–and people are emotional Saturday 11:56 AM
- Reddit links leaked trade deal documents to Russian campaign Saturday 10:44 AM
- How to stream Alistair Overeem vs. Jairzinho Rozenstruik Saturday 8:30 AM
- Amazon sends customers condoms and soap instead of Nintendo Switch Saturday 8:28 AM
- How to live stream Jermall Charlo vs. Dennis Hogan Saturday 8:00 AM
- Apple TV’s ‘Truth Be Told’ is a criminally dull drama Saturday 6:00 AM
- Thousands of Uber users have reported sexual assaults, company says Friday 5:40 PM
- ‘Astronomy Club’ reformats the sketch show Friday 4:58 PM
A data breach at a California-based auto lending company left exposed the personal information of at least half a million customers—and potentially more than a million.
Kromtech Security Researchers discovered the repository online this week and identified the owner as Alliance Direct Lending Corporation, an automotive finance company whose website promotes its use of encryption to protect customer details. According to Kromtech, however, out of the roughly 1,000 files contained in the repository, more than 200 were not secured.
The researchers discovered what appears to be customer purchase information, including full names, addresses, FICO credit scores, vehicle information, and the last four digits of Social Security numbers. Additionally, several audio recordings were leaked of conversations between the customers and lenders, both in Spanish and English—the “consent calls” included the customers’ names, dates of birth, Social Security numbers, and phone numbers.
The data, which was publicly accessible, was contained on an Amazon AWS S3 bucket (a cloud storage device).
While Kromtech was able to locate these files online with relative ease, it remains unclear whether the data was accessed by anyone else—including anyone with criminal intent—before the breach was resolved. It’s also unclear for how long the data could be accessed by anyone online. According to Kromtech, the properties on the storage device show that it was last modified on Dec. 29, 2016.
“The IT administrator claimed that [the data] had only recently been leaked and was not up for long,” said Bob Diachenko, a Kromtech security researcher.
“The danger of this information being leaked is that cyber criminals would have enough to engage in identity theft, obtain credit cards, or even file a false tax return,” continued Diachenko. “Alliance Direct Lending is based in California where the law requires notification of a breach when a California resident’s unencrypted personal information is compromised. California was the first state in the U.S. to require notification of security breaches.”
The auto lender is the second data breach publicly reported by Kromtech this week. The first was at an online futures trading brokerage called AMP, which left exposed thousands of customer details, including credit reports, passport scans, and customer chatlogs. The leak, caused by a misconfigured backup storage device, was secured shortly after Kromtech reached out to the company.
Earlier this month, Kromtech discovered a massive data breach at Schoolzilla, a U.S.-based data warehouse that held information on more than a million K-12 students in the United States. The breach reportedly included a slew of test scores and social security numbers. The leaky device was secured within 24 hours of Kromtech’s notification.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.