Visible to the public Analyzing SocialArks Data Leak - A Brute Force Web Login Attack

TitleAnalyzing SocialArks Data Leak - A Brute Force Web Login Attack
Publication TypeConference Paper
Year of Publication2022
AuthorsQian, Jun, Gan, Zijie, Zhang, Jie, Bhunia, Suman
Conference Name2022 4th International Conference on Computer Communication and the Internet (ICCCI)
Keywordsbrute force attacks, cloud computing, Collaboration, Companies, Data Breach, Databases, elasticsearch, Ethics, Firewalls (computing), Force, Human Behavior, human factors, Intrusion detection, policy-based governance, pubcrawl, SocialArks
AbstractIn this work, we discuss data breaches based on the "2012 SocialArks data breach" case study. Data leakage refers to the security violations of unauthorized individuals copying, transmitting, viewing, stealing, or using sensitive, protected, or confidential data. Data leakage is becoming more and more serious, for those traditional information security protection methods like anti-virus software, intrusion detection, and firewalls have been becoming more and more challenging to deal with independently. Nevertheless, fortunately, new IT technologies are rapidly changing and challenging traditional security laws and provide new opportunities to develop the information security market. The SocialArks data breach was caused by a misconfiguration of ElasticSearch Database owned by SocialArks, owned by "Tencent." The attack methodology is classic, and five common Elasticsearch mistakes discussed the possibilities of those leakages. The defense solution focuses on how to optimize the Elasticsearch server. Furthermore, the ElasticSearch database's open-source identity also causes many ethical problems, which means that anyone can download and install it for free, and they can install it almost anywhere. Some companies download it and install it on their internal servers, while others download and install it in the cloud (on any provider they want). There are also cloud service companies that provide hosted versions of Elasticsearch, which means they host and manage Elasticsearch clusters for their customers, such as Company Tencent.
DOI10.1109/ICCCI55554.2022.9850265
Citation Keyqian_analyzing_2022