Home >> Linux >> Shodan Search Exposes Thousands of Servers Hosting Passwords and Keys

Shodan Search Exposes Thousands of Servers Hosting Passwords and Keys

Thousands of etcd servers “are spitting sensitive passwords and encrypted keys,” reports Fossbytes:

Security researcher Giovanni Collazo was able to harvest 8781 passwords, 650 AWS access keys, 23 secret keys, and 8 private keys. First, he ran a query on the hacker search engine Shodan that returned around 2300 servers running etcd database. Then, he ran a simple script that gave him the login credentials stored on these servers which can be used to gain access to CMSs, MySQL, and PostgreSQL databases, etc.
etcd is a database used by computing clusters to store and exchange passwords and configuration settings between servers and applications over the network. With the default settings, its programming interface can return administrative login credentials without any authentication upfront… All of the data he harvested from around 1500 servers is around 750MB in size… Collazo advises that anyone maintaining etcd servers should enable authentication, set up a firewall, and take other security measures.
Another security research independently verified the results, and reported that one MySQL database had the root password “1234”.


Share on Google+

Read more of this story at Slashdot.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

*