Security boffins scoured the web and found hundreds of valid API keys

Global bank's devs have some cleaning up to do after cloud creds found in website code Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.…

Security boffins scoured the web and found hundreds of valid API keys
Security boffins scoured the web and found hundreds of valid API keys Photo: The Register

Global bank's devs have some cleaning up to do after cloud creds found in website code
Computer security boffins have conducted an analysis of 10 million websites and found almost 2,000 API credentials strewn across 10,000 webpages.

The researchers detail their findings in a preprint paper titled "Keys on Doormats: Exposed API Credentials on the Web," and say they conducted the study because much of the attention on exposed credentials has focused on scouring code repositories and source code.

They argue that dynamic analysis of production websites is essential to understand the scope of the problem.

"What we found were highly sensitive API credentials left publicly exposed on public webpages," Nurullah Demir, a PhD candidate at Stanford and corresponding author, told The Register in an email.

"These act as access tokens that authorize applications to interact with third-party services, granting direct access to critical infrastructure like cloud platforms and payment providers."
Demir contends that API credentials are even more dangerous than exposed login details because they provide programmatic access to resources.

The researchers scanned approximately 10 million websites using a tool called TruffleHog , and found 1,748 valid credentials belonging to organizations including multinational corporations, critical infrastructure entities, and government agencies.

The keys provide access to services like AWS, GitHub, Stripe, and OpenAI.

Demir said one of the affected organizations was a global bank.

Another makes firmware for electronic devices.

"A 'Global Systemically Important Financial Institution' exposed its cloud credentials directly on its webpages," said Demir.

"This gave direct access to multiple core cloud infrastructure services, including databases and key management systems."
The researchers also found repository credentials for a developer responsible for firmware used by various manufacturers of drones and remote-controlled devices.

Attackers could use those credentials to modify source code and push malicious firmware updates to various devices, Demir said.

"Exposure is widespread across service categories, with cloud services (e.g., AWS, Cloudflare) and payment services (e.g., Stripe, Razorpay) accounting for the majority of verified credentials," the paper explains.

"AWS credentials alone represent more than 16 percent of all verified exposures and were found on over 4,693 websites.

Email and communication services such as SendGrid and Twilio also appear frequently, with a significant portion of their exposures originating from embedded third-party resources."
Most of the credentials the researchers found were present in JavaScript resources (84 percent), followed by HTML (eight percent) and JSON (seven percent) files.

They also turned up unusual cases like a verified GitHub access token embedded in a CSS file.

In JavaScript files, 62 percent of credential exposures show up in bundles created by build tools like Webpack.

Demir said he and his co-authors – Yash Vekaria of UC Davis, Georgios Smaragdakis from TU Delft/Stanford, and Zakir Durumeric from Stanford – made a significant effort to contact affected organizations.

The number of exposed credentials declined by half in about two weeks after the researchers started to report their findings.

"When we got feedback from the developers, we saw that a significant number of them were completely unaware of the exposures," he explained.

"What is perhaps most concerning is that our historical analysis showed these credentials often remain exposed for an average of 12 months, in some cases for years."
Demir said that he and his co-authors only verified credentials for 14 different service providers, so the exposure figure represents a lower bound.

"We strongly believe that the actual number of exposed credentials across the web is much higher than what we captured in this study," he said.

®

Source: This article was originally published by The Register

Read Full Original Article →

Share this article

Comments (0)

No comments yet. Be the first to comment!

Leave a Comment

Maximum 2000 characters