Internal information belonging to hosting provider GoDaddy has been exposed via an error in Amazon’s AWS bucket configuration. According to cybersecurity firm UpGuard, a set of documents were left in an Amazon S3 bucket which was available to the public. ZDNet reports: The information involved in the security breach appeared to describe GoDaddy’s architecture, as well as “high-level configuration information for tens of thousands of systems and pricing options for running those systems in Amazon AWS, including the discounts offered under different scenarios,” according to UpGuard. Configuration files for hostnames, operating systems, workloads, AWS regions, memory, CPU specifications, and more were included in the exposed cache, which described at least 24,000 systems.

“Essentially, this data mapped a very large scale AWS cloud infrastructure deployment, with 41 different columns on individual systems, as well as summarized and modeled data on totals, averages, and other calculated fields,” the cybersecurity firm said. The open bucket, called “abbottgodaddy,” also included what the company believes to be business information relating to GoDaddy and Amazon AWS’ relationship, including rate negotiations. This information should have been kept confidential. The open bucket, called “abbottgodaddy,” also included what the company believes to be business information relating to GoDaddy and Amazon AWS’ relationship, including rate negotiations. This information should have been kept confidential.

Share on Google+

of this story at Slashdot.

…read more

Source:: Slashdot