Story image

Level One Robotics breach leaves 157GB of unsecured automotive data exposed

24 Jul 2018

More than 100 manufacturing companies including Tesla, Volkswagen, Toyota, and Ford have been caught up in a data breach – all because of one engineering service provider’s lack of security.

Level One Robotics hosted 157 gigabytes of customer data, company data, and employee data on a publlicly assessible server that was exposed by a file transfer protocol called rsync.

According to security firm UpGuard, the data included more than 10 years of non-disclosure agreements, factory floor plans, ID badge request forms, VPN access request forms, and assembly line schematics.

“Customer contact details, including names and titles of client employees were also present, illustrating the network of connections in the robotics automation pipeline. The documents by which Level One contractors request ID badges and VPN credentials to some of these clients are also exposed in the rsync discovery, a significant point for social engineering,” UpGuard says in a blog.

The data also included Level One Robotics’ own business data including invoices, contracts, and bank account details.

“Corporate data exposed on the rsync server includes sales information like invoices, prices, and scopes of work. Insurance policies for Level One contractors are included. Other files contain notes on customers, projects, and the common business documents one would expect on an enterprise file server,” UpGuard states.

“Also included is banking information for Level One, including account and routing numbers, and SWIFT codes. A SWIFT code is an international bank code that identifies particular banks worldwide.”

Level One’s employees weren’t spared either: Driver’s licence and passport scans belonging to some employees were also leaked, revealing information including names, photographs, and ID numbers.

UpGuard says that the rsync file transfer protocol is designed to mirror or back up large data sets. In this case, the server was not secured and was downloadable to anyone who used an rsync client and connected to the rsync port.

“Rsync instances should be restricted by IP address so that only designated clients can even connect, and user access should be set up so that clients must authenticate before receiving the dataset. Without these measures, rsync is publicly accessible,” the company states.

According to Digital Guardian managed services security engineer Naaman Hart, the core of this breach is a fundamental misunderstand of security around internet-facing systems.

“There were no ‘Access Control Lists’ to limit who connected to RSYNC via IP and there were no Username/Password requirements either.  Without these basic security measures finding the server was a free-for-all for anyone with an RSYNC client that could scan the internet for the open port,” Hart says.

“This is a great example of the need for ‘data aware’ security technologies.  If Level One had data-centric security in place, it could have prevented its partners' sensitive data from being altered, deleted, or in this case copied without prior permission. Companies must learn from incidents like this and apply the right methods of protection to their IT environment, with the ability to apply security at the data-level being the most critical,” Hart concludes.

UpGuard also says that the supply chain breach is significant not only because manufacturers want to keep sensitive information confidential, but also because employee data was also caught up in it.

“Malicious actors could potentially sabotage or otherwise undermine operations using the information present in these files; competitors could use them to gain an unfair advantage. The presence of so many strongly worded NDAs within the data set itself speaks to the level of confidentiality expected by these partners when handling this kind of information.”

“The personal information of several Level One employees was also exposed, including scans of passports and driver’s licenses. These kinds of documents should never be publicly exposed, opening the subjects up to identity theft and other fraud.”

UpGuard initially discovered the data on July 1. It contacted Level One Robotics on July 5 and after four days, finally made contact. On July 10, Level One ‘made every effort to shut it down’.

"While such an ecosystem can make for great efficiencies and scale, it also opens the entire chain up to risk when a single link faces an exposure," UpGuard concludes.

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.