Title | Analyzing SocialArks Data Leak - A Brute Force Web Login Attack |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Qian, Jun, Gan, Zijie, Zhang, Jie, Bhunia, Suman |
Conference Name | 2022 4th International Conference on Computer Communication and the Internet (ICCCI) |
Keywords | brute force attacks, cloud computing, Collaboration, Companies, Data Breach, Databases, elasticsearch, Ethics, Firewalls (computing), Force, Human Behavior, human factors, Intrusion detection, policy-based governance, pubcrawl, SocialArks |
Abstract | In this work, we discuss data breaches based on the "2012 SocialArks data breach" case study. Data leakage refers to the security violations of unauthorized individuals copying, transmitting, viewing, stealing, or using sensitive, protected, or confidential data. Data leakage is becoming more and more serious, for those traditional information security protection methods like anti-virus software, intrusion detection, and firewalls have been becoming more and more challenging to deal with independently. Nevertheless, fortunately, new IT technologies are rapidly changing and challenging traditional security laws and provide new opportunities to develop the information security market. The SocialArks data breach was caused by a misconfiguration of ElasticSearch Database owned by SocialArks, owned by "Tencent." The attack methodology is classic, and five common Elasticsearch mistakes discussed the possibilities of those leakages. The defense solution focuses on how to optimize the Elasticsearch server. Furthermore, the ElasticSearch database's open-source identity also causes many ethical problems, which means that anyone can download and install it for free, and they can install it almost anywhere. Some companies download it and install it on their internal servers, while others download and install it in the cloud (on any provider they want). There are also cloud service companies that provide hosted versions of Elasticsearch, which means they host and manage Elasticsearch clusters for their customers, such as Company Tencent. |
DOI | 10.1109/ICCCI55554.2022.9850265 |
Citation Key | qian_analyzing_2022 |