August 11th, 2024

Corporate Secrets Were Left Exposed. This Guy Found Them All

Bill Demirkapi discovered over 15,000 hardcoded secrets and 66,000 vulnerable websites, highlighting significant security risks and the need for better reporting mechanisms and innovative solutions in cybersecurity.

Read original articleLink Icon
Corporate Secrets Were Left Exposed. This Guy Found Them All

Independent security researcher Bill Demirkapi has uncovered over 15,000 hardcoded secrets and 66,000 vulnerable websites by utilizing overlooked data sources. His findings, presented at the Defcon security conference, include sensitive information such as passwords and API keys linked to various organizations, including Nebraska’s Supreme Court and Stanford University. Demirkapi's research highlights the risks associated with hardcoded secrets, which can lead to unauthorized access and data breaches. He employed unconventional methods, such as scanning VirusTotal's extensive database, to identify these vulnerabilities at scale. His approach revealed that many high-profile websites, including those owned by major companies, had dangling subdomain issues, making them susceptible to attacks. While Demirkapi has developed methods to revoke some exposed secrets, he faced challenges in reporting vulnerabilities to companies like GitHub and Amazon Web Services, which lack efficient reporting mechanisms. His work emphasizes the need for innovative solutions to address security vulnerabilities and suggests that there are still many untapped data sources that could help improve web security.

- Bill Demirkapi found over 15,000 hardcoded secrets and 66,000 vulnerable websites.

- His research revealed significant security risks linked to exposed passwords and API keys.

- Demirkapi utilized unconventional data sources to identify vulnerabilities at scale.

- He faced challenges in reporting issues to major companies due to inadequate reporting systems.

- The findings underscore the importance of innovative approaches to enhance cybersecurity.

Link Icon 6 comments
By @ffjffsfr - 5 months
He used retrohunt service which is part of virustotal https://virustotal.readme.io/docs/searching a service that allows developers to scan files for vulnerability. Apparently, virus total stores files and allows third parties to rescan these files later. Sounds like a vulnerability of this service and terrible practice. How can you expose your user files to any arbitrary access? Of course you should not put your secrets into file you upload to some virus scan, but how many users know that file they upload will be accessible publicly?
By @fire_lake - 5 months
By @Ukv - 5 months
> Demirkapi turned to Amazon Web Services, but the company refused to provide him with access to existing private reporting tools. “We believe firmly that customer credentials, including security keys, belong solely to customers. AWS does not grant external users access to manage or revoke security keys as that would violate security policies and erode customer trust,” says Aisha Johnson, an AWS spokesperson

AWS's response seems muddled. To make sure that "customer credentials [...] belong solely to customers" surely you would typically want an endpoint to revoke exposed secret keys?

By @mmooss - 5 months
The scale of incompetence in our industry should be embarassing. You can also see it in the public statements made by some SV 'leaders' - what other industry has prominent people making fools of themselves like that? Is it a surprise that their products are poorly made or often scams? When people tell you who they are, believe them!

If you want to see something scary, look at the fake story Demirkapi managed to post, and note the domain name - actually nytimes.com! (IMPORTANT: The story is not real!)

https://web.archive.org/web/20230330043732/https://intl.prd....

Again, that's not real. But if the hacker tried, lots of people could react long before they realize it.

By @itohihiyt - 5 months
Light on detail.

TL;DR a security researcher found lots of common security issues by using alternative data sources.