AWS S3 Bucket Exposed Containing GoDaddy Server Configuration and Pricing Models

Another week, another publicly accessible AWS storage cloud found to be leaking enterprise secrets. This time around, the company exposed was GoDaddy – but in a twist on the normal storyline, it was an AWS employee responsible for the misconfiguration.

Researchers with the UpGuard Cyber Risk Team found a publicly accessible Amazon S3 bucket wide open for public consumption. Included within that data store were documents that detailed configurations and pricing information for tens of thousands of systems in the AWS cloud.

Read more about the GoDaddy data leak on DarkReading.

Gain Deeper Insights Into The Threat

Sign up to gain access to our special reports on threat actors and their tactics as well as daily Threat Brief.

Your support will enable us to continue our production of action-oriented content and help us help you stay informed on the latest in adversary activities.

Try our free seven day trial.

Sign Up For Free Trial of The Daily Threat Brief