- Animator for Netflix’s ‘Carmen Sandiego’ says he was fired after asking for fair pay Sunday 3:17 PM
- YouTube reverses decision to remove creators’ badges Sunday 1:47 PM
- How video game developer Valve got served secret subpoena as part of FBI’s counterterrorism fight Sunday 12:31 PM
- Aron Eisenberg, ‘Star Trek: Deep Space Nine’ actor, dead at 50 Sunday 11:35 AM
- Who needs glass slippers? This Cinderella cosplayer upgraded with a stunning glass arm Sunday 10:19 AM
- How to check if Yahoo owes you $358 Sunday 9:25 AM
- How to stream Bears vs. Redskins on Monday Night Football Sunday 7:00 AM
- What are the best alternatives to the electoral college? Sunday 6:30 AM
- The best PS4 games you can’t play anywhere else Sunday 6:00 AM
- How to watch the 2019 Emmy Awards Sunday 5:00 AM
- How to stream ‘Power’ season 6, episode 5 Sunday 4:00 AM
- Former developer at software company deletes his code to protest its ties to ICE Saturday 4:21 PM
- A mysterious website is doxing Hong Kong protesters and journalists Saturday 1:44 PM
- The best ‘Skyrim’ followers and how to get them Saturday 1:26 PM
- Why Joel Osteen gets cyberbullied every time Houston floods Saturday 12:40 PM
A data breach at an online futures trading brokerage left exposed thousands of files, including credit reports, passport scans, and customer chat logs.
The leak, now secured, was identified and reported by Chris Vickery of the Kromtech Security Research Team. It was caused by a misconfigured backup device managed by a third-party IT vendor.
The trading firm was identified as AMP, a company that offers numerous platforms for online futures trading. According to the Online Brokers Hub, the company is based in Chicago, Illinois.
While the issue with the backup system is not uncommon, the breach is notable for the amount of money that passes through AMP’s systems. “The files indicate that AMP has over $50 million on the books and additionally include the private details of over 10,000 account applicants,” Kromtech reports.
Vickery reported that about 70GB of data had been sitting on the open web, consisting of roughly 97,000 files.
“It includes credit reports, passport scans, internal company emails, customer chat logs, and basically everything an identity thief would need in order to mount a serious campaign,” Vickery said. “I was surprised at the number of plaintext customer passwords discussed in the chat logs (by staff and customers alike).”
Security researchers who report such breaches are often met with suspicion and even hostility by the companies whose data is at risk. But AMP responded comparatively well, according to Vickery:
“The head honcho over at AMP was surprised when I fully explained the situation to him over a phone call. He rightly wondered what AMP was paying its third-party IT company for. If a third party, which specializes in IT, can’t catch this kind of leakage themselves, there is some serious improvement to be done.
“AMP’s CEO was relieved to hear that I wasn’t trying to sell him anything or attempting any sort of blackmail or extortion, and I’m thankful he understood that I merely discovered the unsecured data rather than causing it to become unsecured. That’s a distinction many people fail to grasp, especially when their company is potentially in the hot seat.”
Vickery’s disclosure comes days after reporting a massive data breach at a U.S.-based data warehouse, Schoolzilla, which held personal information on more than a million American students (K-12). The breach reportedly contained a vast amount of test scores and social security numbers. The issue was fixed within 24 hours of Vickery’s report.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.