Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

Amazon confirms employee data exposed in leak linked to MOVEit vulnerability

November 12, 2024 at 08:37AM

Amazon employees’ data was included in a leak linked to the MOVEit vulnerability, affecting over 2.86 million records. Although Amazon maintains system security, the stolen information includes employee contact details, potentially facilitating social engineering threats. The data is being circulated by a user named Nam3L3ss on BreachForums.

### Meeting Takeaways

1. **Data Breach Overview**:
– Amazon employees’ data is part of a larger data breach related to the 2023 MOVEit vulnerability.

2. **Nature of Stolen Data**:
– Only employee work contact information was compromised, including:
– Work email addresses
– Desk phone numbers
– Building locations

3. **Security Status**:
– Both Amazon and AWS systems remain secure, with no direct security event reported by Amazon.

4. **Vulnerability Details**:
– The breach is linked to CVE-2023-34362, which was a critical vulnerability in MOVEit file transfer software that allowed unauthorized data access.

5. **Depth of the Data Leak**:
– The leaked directories contain detailed employee information, making it a significant risk for social engineering attacks.
– Amazon has the highest number of exposed records among affected companies, with over 2.86 million records included in the breach.

6. **Data Distribution**:
– The stolen data is being auctioned and circulated by a persona known as Nam3L3ss on BreachForums, claiming to have numerous new releases.

7. **Context of Data Exposure**:
– While multiple companies were affected (including HP, 3M, and Lenovo), Amazon was highlighted for having the most extensive data exposure in this incident.

8. **Origin of the Vulnerability**:
– The MOVEit breach was initially linked to the Cl0p ransomware group, but the current data being distributed by Nam3L3ss is distinct from earlier leaks.

### Action Items:
– **Monitor Cybersecurity Events**: Maintain vigilance regarding potential social engineering threats due to the data leak.
– **Assess Communication**: Evaluate potential risks in communication as employee contact information is involved.
– **Vendor Review**: Review security protocols and data handling practices of third-party vendors, specifically those affiliated with personal data.

Full Article