Story image

Level One Robotics breach leaves 157GB of unsecured automotive data exposed

24 Jul 18

More than 100 manufacturing companies including Tesla, Volkswagen, Toyota, and Ford have been caught up in a data breach – all because of one engineering service provider’s lack of security.

Level One Robotics hosted 157 gigabytes of customer data, company data, and employee data on a publlicly assessible server that was exposed by a file transfer protocol called rsync.

According to security firm UpGuard, the data included more than 10 years of non-disclosure agreements, factory floor plans, ID badge request forms, VPN access request forms, and assembly line schematics.

“Customer contact details, including names and titles of client employees were also present, illustrating the network of connections in the robotics automation pipeline. The documents by which Level One contractors request ID badges and VPN credentials to some of these clients are also exposed in the rsync discovery, a significant point for social engineering,” UpGuard says in a blog.

The data also included Level One Robotics’ own business data including invoices, contracts, and bank account details.

“Corporate data exposed on the rsync server includes sales information like invoices, prices, and scopes of work. Insurance policies for Level One contractors are included. Other files contain notes on customers, projects, and the common business documents one would expect on an enterprise file server,” UpGuard states.

“Also included is banking information for Level One, including account and routing numbers, and SWIFT codes. A SWIFT code is an international bank code that identifies particular banks worldwide.”

Level One’s employees weren’t spared either: Driver’s licence and passport scans belonging to some employees were also leaked, revealing information including names, photographs, and ID numbers.

UpGuard says that the rsync file transfer protocol is designed to mirror or back up large data sets. In this case, the server was not secured and was downloadable to anyone who used an rsync client and connected to the rsync port.

“Rsync instances should be restricted by IP address so that only designated clients can even connect, and user access should be set up so that clients must authenticate before receiving the dataset. Without these measures, rsync is publicly accessible,” the company states.

According to Digital Guardian managed services security engineer Naaman Hart, the core of this breach is a fundamental misunderstand of security around internet-facing systems.

“There were no ‘Access Control Lists’ to limit who connected to RSYNC via IP and there were no Username/Password requirements either.  Without these basic security measures finding the server was a free-for-all for anyone with an RSYNC client that could scan the internet for the open port,” Hart says.

“This is a great example of the need for ‘data aware’ security technologies.  If Level One had data-centric security in place, it could have prevented its partners' sensitive data from being altered, deleted, or in this case copied without prior permission. Companies must learn from incidents like this and apply the right methods of protection to their IT environment, with the ability to apply security at the data-level being the most critical,” Hart concludes.

UpGuard also says that the supply chain breach is significant not only because manufacturers want to keep sensitive information confidential, but also because employee data was also caught up in it.

“Malicious actors could potentially sabotage or otherwise undermine operations using the information present in these files; competitors could use them to gain an unfair advantage. The presence of so many strongly worded NDAs within the data set itself speaks to the level of confidentiality expected by these partners when handling this kind of information.”

“The personal information of several Level One employees was also exposed, including scans of passports and driver’s licenses. These kinds of documents should never be publicly exposed, opening the subjects up to identity theft and other fraud.”

UpGuard initially discovered the data on July 1. It contacted Level One Robotics on July 5 and after four days, finally made contact. On July 10, Level One ‘made every effort to shut it down’.

"While such an ecosystem can make for great efficiencies and scale, it also opens the entire chain up to risk when a single link faces an exposure," UpGuard concludes.

Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.
Gartner names newcomer Exabeam a leader in SIEM
The vendor landscape for SIEM is evolving, with recent entrants bringing technologies optimised for analytics use cases.
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.