Site icon TechNewsBoy.com

Leftover files are putting visitors to popular websites at risk

Although it may be difficult for web administrators to keep an eye on every single file, the most severe server breaches are often the result of the least noticeable security holes on their websites and leftover files are one such example.

By analyzing the top 35,000 websites from the Alexa top 1m list, CyberNews discovered that 82 of the most popular websites had leftover files exposed to anyone and accessible without authorization. 

CyberNews researcher Martynas Vareikis provided further insight on the dangers posed by leftover files in a new report, saying:

“From overlooked database history and DS_STORE files to GIT repositories, even a single exposed item can open millions, if not billions, of visitors to a plethora of potential dangers, including data breaches, phishing attacks, identity theft, or worse.”

To make matters worse, the reach of the affected sites is massive and the news outlet estimates that these sites receive around 17m total visits a month. The list is also made up of sites from all over the world including domains from the US, Russia, Japan, China, Germany, France, Korea, the Netherlands and more and these sites are even linked to by government and educational organizations.

Exposed leftover files

To conduct their investigation, CyberNews researchers scanned the 35,000 most-visited websites on the internet for exposed DS-STORE, ENV AND MYSQL_HISTORY files as well as Git repositories and then analyzed the output and removed any false positives.

When it came to the types of leftover files found on the world’s most-visited sites, Desktop Services Store (DS_STORE) files topped the list with over 81 exposed instances overall followed by exposed GIT directories with 24 instances and MYSQL_HISTORY and ENV files with four exposed instances of each file type discovered during the investigation.

By analyzing these exposed files, malicious actors can collect information about the contents of folders stored in web servers which can lead them to unprotected files containing sensitive data and allow them to access credentials.

Founder of the cyber defense and threat detection service provider Melurna, Sam Jadali explained to CyberNews how leftover files can be used by cybercriminals to perform lateral attacks, inject malware or to launch ransomware attacks, saying:

“The ubiquitous and pervasive nature of these bots makes it increasingly easy to compromise servers. Web and app developers may forget to delete backups, application environment or MySQL history files. When left in publicly accessible locations, bad actors use the data to discover credentials, map server infrastructure, perform lateral attacks, inject malware, or infect servers with ransomware. Using today’s advanced technology, hackers can scan the global internet IPv4 range in less than 5 minutes.”

To mitigate the security threats from leftover files, Jadali recommends that web server administrators validate input from users, handle exceptions, use browser security headers, implement Identity and Access Management, run automatic security products to highlight vulnerabilities during development, testing and deployment and perform manual penetration testing on a regular basis.

Looking to improve your security online? Check out our list of the best antivirus software and protect your privacy with one of the best VPN services

Via CyberNews

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@technewsboy.com. The content will be deleted within 24 hours.
Exit mobile version