BrowserStack: hacker came in on old test machine using Shellshock bug

0
248

BrowserStack has an explanation on how a hacker e-mail addresses of users has been able to obtain. According to the browsertestdienst knew the attacker thanks to the Shellshock bug an outdated server on Amazon Web Services.

In the excuusmail describes BrowserStack the probable approach of the hacker. The attacker would be via the Shellshock vulnerability in Bash access to an old, uitgefaseerde server within the virtualized environment that BrowserStack at Amazon Web Services running. This gave the hacker the api keys for AWS in the hands. Using this information, he knew a private virtual server and pretend to be a legitimate BrowserStack administrator.

The attacker began according to BrowserStack personal and login data from a database to copy. It smote the monitoring systems alarm, after which the hacker was blocked. He was, according to the browsertestdienst able to in a short time, estimated to be approximately five thousand account information to copy, and then these users an e-mail which among other things was unjustly written that BrowserStack its doors would close.

BrowserStack offers his apologies for the incident but suggests that the damage was relatively limited. Not only would be less than 1 percent of the active account has been copied, also emphasized the company that there are no credit card details are captured. Also, passwords are not only hashed, but also salted on the basis of the strong bcrypt algorithm and all of the production systems of BrowserStack would in time of a Shellshock-patch feature. Further, claims the company, additional security measures have been taken, such as encrypting backup and perform a security audit on the AWS infrastructure by an external party.

Comments
(33)