AWS S3 Bucket Exposed Containing GoDaddy Server Configuration and Pricing Models

Another week, another publicly accessible AWS storage cloud found to be leaking enterprise secrets. This time around, the company exposed was GoDaddy – but in a twist on the normal storyline, it was an AWS employee responsible for the misconfiguration.

Researchers with the UpGuard Cyber Risk Team found a publicly accessible Amazon S3 bucket wide open for public consumption. Included within that data store were documents that detailed configurations and pricing information for tens of thousands of systems in the AWS cloud.

Read more about the GoDaddy data leak on DarkReading.