- Amazon’s ‘Clifford the Big Red Dog’ reboot isn’t for you—and that’s fine 3 Years Ago
- Walmart pulls ‘Let it snow’ cocaine sweater, ruining Christmas 3 Years Ago
- The way Facebook serves political ads could be driving polarization 3 Years Ago
- A YouTuber simulated a mass shooting from his hotel room—and then posted the videos 3 Years Ago
- Trump tries another ‘Simpsons’ defense as impeachment articles drop Today 10:52 AM
- ‘Rick and Morty’ attempts to contain its dragon with mixed results in episode 4 Today 9:24 AM
- James Comey puts ‘Fox & Friends’ on blast Today 8:54 AM
- Nick Cannon’s latest Eminem diss is not working out for him Today 8:27 AM
- Conservatives want a war on porn. It’s puritanical sex values that need to go Today 7:00 AM
- The year in Meghan McCain news cycles Today 6:30 AM
- Why Tumblr is totally obsessed with 2 characters from Stephen King’s ‘It’ Today 6:00 AM
- Game developer Chucklefish accused of whitewashing characters of color Monday 5:22 PM
- Apple TV’s ‘Hala’ is a silent explosion of a coming-of-age film Monday 5:20 PM
- This new video game apparently lets you play Jesus Monday 4:02 PM
- Golden toilet creator sells world’s most expensive banana—only for another artist to eat it Monday 3:24 PM
A data breach at an online futures trading brokerage left exposed thousands of files, including credit reports, passport scans, and customer chat logs.
The leak, now secured, was identified and reported by Chris Vickery of the Kromtech Security Research Team. It was caused by a misconfigured backup device managed by a third-party IT vendor.
The trading firm was identified as AMP, a company that offers numerous platforms for online futures trading. According to the Online Brokers Hub, the company is based in Chicago, Illinois.
While the issue with the backup system is not uncommon, the breach is notable for the amount of money that passes through AMP’s systems. “The files indicate that AMP has over $50 million on the books and additionally include the private details of over 10,000 account applicants,” Kromtech reports.
Vickery reported that about 70GB of data had been sitting on the open web, consisting of roughly 97,000 files.
“It includes credit reports, passport scans, internal company emails, customer chat logs, and basically everything an identity thief would need in order to mount a serious campaign,” Vickery said. “I was surprised at the number of plaintext customer passwords discussed in the chat logs (by staff and customers alike).”
Security researchers who report such breaches are often met with suspicion and even hostility by the companies whose data is at risk. But AMP responded comparatively well, according to Vickery:
“The head honcho over at AMP was surprised when I fully explained the situation to him over a phone call. He rightly wondered what AMP was paying its third-party IT company for. If a third party, which specializes in IT, can’t catch this kind of leakage themselves, there is some serious improvement to be done.
“AMP’s CEO was relieved to hear that I wasn’t trying to sell him anything or attempting any sort of blackmail or extortion, and I’m thankful he understood that I merely discovered the unsecured data rather than causing it to become unsecured. That’s a distinction many people fail to grasp, especially when their company is potentially in the hot seat.”
Vickery’s disclosure comes days after reporting a massive data breach at a U.S.-based data warehouse, Schoolzilla, which held personal information on more than a million American students (K-12). The breach reportedly contained a vast amount of test scores and social security numbers. The issue was fixed within 24 hours of Vickery’s report.
Dell Cameron was a reporter at the Daily Dot who covered security and politics. In 2015, he revealed the existence of an American hacker on the U.S. government's terrorist watchlist. He is a co-author of the Sabu Files, an award-nominated investigation into the FBI's use of cyber-informants. He became a staff writer at Gizmodo in 2017.