Are Abandoned Cloud Storage Buckets a Major Security Risk?

February 6, 2025
Are Abandoned Cloud Storage Buckets a Major Security Risk?

Are Abandoned Cloud Storage Buckets a Major Security Risk?

The recent study conducted by cybersecurity researchers at watchTowr has shed light on the significant security risks posed by abandoned cloud storage buckets. The research primarily focused on Amazon Web Services (AWS) S3 buckets. AWS S3 buckets are widely utilized by organizations across various sectors, including military, government, and cybersecurity, to store crucial data such as code, files, and templates. As these storage solutions are integral to the operations of many entities, the vulnerabilities linked to their abandonment pose a significant threat that cannot be ignored.

The Scope of the Problem

Abandoned Buckets and Their Usage

The researchers tracked approximately 150 AWS S3 buckets that had been used in commercial and open-source software products, as well as governmental and infrastructural projects, before being subsequently abandoned. During a two-month observation period, these neglected buckets received over 8 million HTTP requests for various purposes including software updates. This continuous interaction with abandoned buckets indicates that despite being neglected, they remain connected to functioning websites. Such ongoing interactions signify that many systems rely on these abandoned buckets for routine operations, exposing them to security risks.

The volume of HTTP requests underscores a critical vulnerability, as it only takes one malicious actor to exploit these continued interactions for nefarious purposes. When organizations fail to sever ties with abandoned cloud resources, they effectively leave a backdoor open for potential cyber attacks. This is especially concerning when considering the types of data stored within these buckets, which could range from sensitive government documents to proprietary business information. The widespread use of AWS S3 buckets across various sectors only amplifies the potential damage.

The Analogy and Implications

To understand the implications of the findings, watchTowr CEO Benjamin Harris drew an analogy. He likened the situation to purchasing a house and continuing to receive mail addressed to the previous owners from important entities like governments and militaries. Although the researchers did not read or respond to these requests, Harris asserted that doing so could potentially trigger substantial security incidents. The underlying issue, according to Harris, is the global approach to the usage and subsequent abandonment of such infrastructures.

Harris’ analogy highlights the inadvertent but substantial risk posed by these abandoned buckets. Much like intercepted mail could reveal sensitive information, HTTP requests to outdated cloud storage can unintentionally disclose critical data or provide a means for unauthorized access. This situation becomes a glaring vulnerability in a digital age where interconnectivity reigns supreme. The need for robust governance over cloud infrastructure lifecycle management is paramount to prevent such scenarios from exploiting organizational weaknesses, particularly those involving sensitive or classified information.

Potential Exploits and Risks

Exploitation by Malicious Actors

A series of examples showcased in their blog elucidate how a malicious actor could exploit an abandoned S3 bucket. Hackers could introduce malicious code into a software update mechanism, leading to widespread disruption across sensitive networks and systems. Alarmingly, the researchers discovered abandoned S3 buckets linked to high-security domains such as .mil websites, operated by the United States Department of Defense. The study notes that if the researchers had malicious intentions, they could have responded to the HTTP requests with nefarious updates or backdoor access tools, potentially compromising entire networks.

The ability to exploit these abandoned buckets represents a notable threat, especially concerning high-security entities like the Department of Defense. Imagine the repercussions if an unauthorized actor could infiltrate such critical networks. The risk extends beyond mere data breaches. It encapsulates the potential for comprehensive system compromise that could impact national security. This possibility drives home the urgency of maintaining strict oversight and implementing fail-safe mechanisms for cloud storage management and account for its lifecycle comprehensively.

Global Reach of the Issue

The HTTP requests visible to watchTowr researchers originated from various global entities, including governmental organizations in the U.S., U.K., Poland, Australia, South Korea, Turkey, Taiwan, Chile, and more. Requests also came from major commercial entities such as Fortune 500 companies, a significant payment card company, financial institutions, universities, software companies, casinos, and even other cybersecurity firms. This wide geographical and sectoral reach underscores the pervasive nature of the issue.

The vast diversity of entities involved highlights the extensive footprint of cloud storage vulnerabilities. The interconnected nature of today’s global economy implies that a breach in one region can reverberate far and wide, potentially compromising international networks. As businesses, governments, and other organizations increasingly rely on cloud technologies for efficiency and connectivity, the ramifications of even a single security lapse can be profound. Recognizing and addressing these vulnerabilities demands an international approach, encompassing policy adjustments, sophisticated monitoring mechanisms, and collaborative threat mitigation strategies across borders.

Responses and Mitigation Efforts

Prompt Actions by Security Agencies

Fortunately, organizations such as the Cybersecurity and Infrastructure Security Agency (CISA) and the U.K.’s National Cyber Security Centre responded promptly to the issues identified, helping to mitigate potential threats. Notably, the researchers found one abandoned S3 bucket linked to a 2012 security advisory posted on CISA’s own website, underlining the ubiquity of this security problem even among the most security-aware organizations. This incident serves as a stark reminder that vulnerabilities can exist anywhere, even within agencies dedicated to cybersecurity.

Such swift reactions from prominent cybersecurity bodies are reassuring, showcasing the commitment to addressing vulnerabilities as soon as they are discovered. However, the prevalence of such issues even among these veteran bodies indicates a broader systemic issue. Immediate actions, while crucial, must be complemented by long-term strategies focusing on prevention and robust cloud storage lifecycle management. These entities must develop comprehensive audit mechanisms and encourage best practices globally to curtail the risks associated with abandoned cloud resources.

Broader Implications for Cloud Storage

The research also uncovered an abandoned S3 bucket related to a major antivirus provider and a VPN appliance vendor. This raised concerns as the researchers believed they could have silently connected to a victim’s network posing as a legitimate user or launch targeted attacks on specific endpoints. This illustrates the broad applicability of the findings across various cloud storage tools and stresses the necessity of vigilance across the entire technology landscape.

The revelation concerning antivirus and VPN providers is significant considering their role in safeguarding data and ensuring secure communication. If such foundational layers of digital security are susceptible to exploitation via abandoned resources, it calls for comprehensive scrutiny and rigorous measures. Businesses reliant on these technologies could face incapacitating breaches with far-reaching impacts. The study’s findings serve as a clarion call for companies to reassess their data storage and handling protocols, particularly those interacting with sensitive networks and client data, ensuring they are impervious to similar vulnerabilities.

AWS’s Role and Recommendations

AWS’s Response to the Findings

In response to the findings, an AWS spokesperson stated that their tools operate as intended, and the issues arose when customers deleted S3 buckets still referenced by third-party applications. AWS, after being notified by watchTowr, blocked the re-creation of the identified buckets to protect their customers. Harris and his team suggested that AWS could address this problem by preventing the registration of previously used bucket names, thereby eliminating the vulnerability class of abandoned infrastructure concerning AWS S3 services. However, this approach might present usability challenges, such as transferring S3 buckets between accounts.

The proactive stance taken by AWS reflects a crucial step in mitigating the identified risks. By blocking the re-creation of previously vulnerable buckets, AWS aims to curb potential exploit opportunities. Nevertheless, ensuring user convenience while safeguarding infrastructure presents a delicate balance. Therefore, AWS and similar cloud service providers might need to innovate new solutions, which could include automated monitoring systems and customer education initiatives to enforce secure practices without compromising service flexibility.

The Broader Cloud Storage Landscape

Additionally, Harris pointed out that AWS is not the only platform grappling with these issues. He advised customers that once a cloud resource like an S3 bucket is created and referenced in any documentation or code, such as a software update process, this reference endures indefinitely, with potential implications persisting. Despite AWS’s efforts, the broader landscape of cloud storage platforms faces analogous challenges that require concerted attention from both providers and users alike.

The acknowledgment that cloud infrastructure issues are not unique to AWS underscores the pervasive nature of this problem. Irrespective of the provider, any entity offering cloud storage must prioritize secure usage, especially regarding orphaned resources. Vigilance and proactive strategies are indispensable across the board to anticipate, recognize, and swiftly rectify potential vulnerabilities. This industry-wide challenge demands an elevated collective awareness and shared best practices, fostering a resilient cyber ecosystem that preempts exploitation.

The Underlying Issue

Ease of Acquiring Internet Infrastructure

The blog emphasized that the core of the issue lies in a mindset fostered by the ease of acquiring internet infrastructure. The nominal cost and effort required to register an S3 bucket or similar resource can lead to inadvertent long-term commitments to maintain these finite resources. The fact that an attacker could potentially revive a resource abandoned long ago to serve malicious content to unsuspecting systems should be alarming. This ease of acquisition coupled with a lack of stringent policies around decommissioning obsolete resources culminates in a significant security risk.

While the initial convenience of setting up cloud infrastructure is irrefutable, the need for sustainable management cannot be overstated. Businesses and institutions inadvertently expose themselves to long-term commitments that require continuous oversight and proactive decommissioning protocols. As attackers and bad actors constantly evolve their methods, the potential for abusing abandoned but still-referenced resources grows. Therefore, integrating rigorous lifecycle management policies and automated alert systems can align operational ease with security imperatives, mitigating the risks germane to these conveniences.

Need for Vigilance and Proactive Measures

A recent study by cybersecurity experts at watchTowr has revealed the considerable security risks associated with abandoned cloud storage buckets. This research primarily zoomed in on Amazon Web Services (AWS) S3 buckets. Organizations from various sectors, including the military, government, and cybersecurity fields, heavily rely on AWS S3 buckets to store essential data like code, documents, and templates. These storage solutions are crucial to the day-to-day operations of many entities. However, when these storage buckets are neglected and abandoned, they become vulnerable, posing a notable security threat that must not be overlooked. Unsecured and forgotten buckets can expose critical data to potential breaches, making it vital for organizations to ensure the continuous monitoring and proper management of their cloud storage solutions. In light of the findings, it’s clear that maintaining vigilant control and securing these storage systems should be a top priority to prevent potential data leaks and unauthorized access.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later