Incident: Data Leak of 50,000 Driving Licences Due to Misconfigured Cloud Storage

Published Date: 2020-08-31

Postmortem Analysis
Timeline 1. The software failure incident of the leaked driving licences happened before August 31, 2020, as the article reporting the incident was published on that date [104182]. Therefore, the estimated timeline for the software failure incident would be in August 2020.
System 1. Amazon cloud storage service - Misconfigured S3 bucket [104182] 2. Roads and Maritime Services infrastructure - Specifically related to toll notices [104182]
Responsible Organization 1. The software failure incident was caused by a misconfiguration in the Amazon cloud storage service where the data containing scanned driver's licenses and toll notices was stored [104182].
Impacted Organization 1. Roads and Maritime Services 2. NSW RMS infrastructure 3. Toll road operator 4. Fleet operator 5. Transport for NSW 6. Australians affected by identity theft and scams [Cited from Article 104182]
Software Causes 1. Misconfigured Amazon S3 bucket leading to exposure of sensitive data such as scanned driver's licenses, toll notices, phone numbers, addresses, and birth dates [104182].
Non-software Causes 1. Misconfigured Amazon S3 bucket where the data was stored, allowing public access to sensitive information [104182]. 2. Lack of proper data security measures in place to protect the scanned images of driver's licenses and toll notices [104182]. 3. Potential human error in uploading the files to the cloud storage service without proper access controls [104182]. 4. Lack of oversight in monitoring and securing the data stored on the cloud storage service [104182].
Impacts 1. More than 50,000 driving licenses were leaked online, exposing personal information such as phone numbers, addresses, and birth dates, which could be used by hackers for identity theft and fraud [104182]. 2. Scammers could use the stolen driver's licenses to apply for credit cards, loans, purchase items, and create financial havoc for the victims [104182]. 3. Australians incurred at least $16 million in losses due to scams involving identity theft or loss of personal and banking information, highlighting the financial impact of such data breaches [104182]. 4. The breach could lead to criminals impersonating individuals, applying for credit, and causing significant damage to the victims' credit history and financial well-being [104182].
Preventions 1. Proper Configuration Management: Implementing proper configuration management practices could have prevented the misconfiguration that led to the exposure of sensitive data [104182]. 2. Regular Security Audits: Conducting regular security audits and checks on cloud storage services could have identified the misconfigured S3 bucket before it was accessed by unauthorized parties [104182]. 3. Data Encryption: Encrypting sensitive data stored in the cloud could have added an extra layer of protection, making it harder for malicious actors to access and misuse the information [104182]. 4. Access Control Policies: Implementing strict access control policies and ensuring that only authorized personnel have access to sensitive data could have limited the exposure of the driver's license information [104182]. 5. Timely Response and Communication: Promptly identifying the breach and notifying affected individuals could have mitigated the potential risks associated with the leaked data [104182].
Fixes 1. Implement proper access controls and security measures to ensure sensitive data is not publicly accessible [104182]. 2. Conduct regular security audits and vulnerability assessments to identify and address any misconfigurations or weaknesses in the system [104182]. 3. Enhance data encryption protocols to protect personal information stored in the cloud [104182]. 4. Provide cybersecurity training to employees to prevent future misconfigurations that could lead to data leaks [104182].
References 1. Ukrainian security consultant Bob Diachenko [Article 104182] 2. IDcare security counsellor Christine Jackson [Article 104182] 3. Security researcher Troy Hunt [Article 104182] 4. Transport for NSW [Article 104182]

Software Taxonomy of Faults

Category Option Rationale
Recurring multiple_organization <Article 104182> The incident reported in the news article does not specifically mention a previous similar incident happening again at the same organization or with its products and services. However, the article does highlight the potential risks and consequences of such a data leak, indicating the importance of robust security measures to prevent such incidents in the future. Regarding similar incidents happening at other organizations or with their products and services, the article mentions that the source of the leak could be a fleet or toll road operator. Security researcher Troy Hunt suggests that the nature of the breach would be trivial for someone with technological knowledge to uncover, raising concerns about the accessibility of such sensitive data. This implies that similar incidents could potentially occur at other organizations that handle sensitive information and store data in a vulnerable manner [104182].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase can be attributed to the misconfiguration of the Amazon cloud storage service where the data containing sensitive information was stored. The incident occurred due to a misconfigured S3 bucket, which allowed public access to the scanned driver's licenses and toll notices [104182]. (b) The software failure incident related to the operation phase can be linked to the exposure of personal information such as phone numbers, addresses, and birth dates due to the misconfiguration of the Amazon cloud storage service. This exposure occurred during the operation of the system, making the data available for public view [104182].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident in this case was primarily due to a misconfiguration within the system. The incident involved a misconfigured Amazon S3 bucket where more than 50,000 scanned driver's licenses and toll notices were exposed to public view. This misconfiguration allowed unauthorized access to sensitive personal information such as phone numbers, addresses, and birth dates [104182]. (b) outside_system: The incident also involved external factors contributing to the failure. The data leak was discovered by a Ukrainian security consultant, Bob Diachenko, who stumbled upon the exposed files. Additionally, the nature of the breach, which involved toll notices, suggested that the source of the leak could be a toll operator or a fleet operator, indicating an external origin of the contributing factors [104182].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case was primarily due to non-human actions, specifically a misconfiguration of an Amazon cloud storage service where the data was stored. The incident occurred because the data containing sensitive information such as scanned driver's licenses and toll notices was exposed in a misconfigured S3 bucket, making it available for public view [104182]. (b) Human actions also played a role in this software failure incident. The data leak was discovered by a Ukrainian security consultant, Bob Diachenko, who stumbled upon the exposed folder of PDF and JPG files containing the scanned images of driver's licenses. Additionally, the incident highlighted the potential risks posed by malicious actors who could have accessed and made copies of the exposed data, leading to identity theft and financial fraud [104182].
Dimension (Hardware/Software) software (a) The software failure incident in the news article is not directly attributed to hardware issues. The incident primarily involves a data leak where more than 50,000 driving licenses were exposed online due to a misconfigured Amazon cloud storage service [104182]. (b) The software failure incident in the news article is attributed to a misconfiguration in the Amazon cloud storage service, which led to the exposure of sensitive data such as scanned driver's licenses, toll notices, phone numbers, addresses, and birth dates. This misconfiguration allowed the data to be publicly viewable, leading to a significant privacy breach [104182].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident in this case is malicious in nature. The incident involved a data leak where more than 50,000 driving licenses were exposed online due to a misconfigured Amazon cloud storage service. The leaked data included sensitive information such as phone numbers, addresses, birth dates, and scanned images of driver's licenses [104182]. The security consultant who discovered the leak labeled it as a "dangerous exposure" and mentioned that malicious actors could have accessed the files and potentially made copies of them for fraudulent activities like identity theft, applying for credit cards, or other scams. The stolen driver's licenses were described as a "golden ticket" for scammers to carry out various fraudulent activities, including opening bank accounts, taking out loans, and making purchases under victims' names [104182]. The incident highlights how the failure was caused by human actions with the intent to harm individuals by exploiting their personal information for financial gain or other malicious purposes.
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions (a) The software failure incident involving the leak of over 50,000 driving licenses online was primarily due to poor decisions related to the misconfiguration of an Amazon cloud storage service. The incident was caused by a misconfigured S3 bucket where the sensitive data was stored, allowing public access to personal information such as phone numbers, addresses, birth dates, and scanned images of driver's licenses [104182]. This misconfiguration was a result of poor decisions made during the setup and management of the cloud storage service, leading to a significant data breach with severe consequences for the individuals affected. (b) Additionally, the incident could also be attributed to accidental decisions or mistakes made during the handling of the sensitive data. The exposure of the driver's licenses and toll notices was not intentional but rather a result of oversight or negligence in ensuring the security and privacy of the stored information. The accidental exposure of such critical personal data could have been prevented with more rigorous security measures and proper data handling protocols [104182].
Capability (Incompetence/Accidental) accidental (a) The software failure incident in the reported articles does not seem to be directly related to development incompetence. The incident was primarily caused by a misconfiguration in the storage system that led to the exposure of sensitive data [104182]. (b) The software failure incident was accidental in nature, as it was a result of a misconfigured Amazon cloud storage service that exposed more than 50,000 scanned driver's licenses and toll notices to the public view. The exposure of this data was not intentional but rather a result of a mistake or oversight in the configuration of the storage system [104182].
Duration permanent, temporary (a) The software failure incident in this case appears to be permanent as the data leak of more than 50,000 driving licenses was due to a misconfigured Amazon S3 bucket where the sensitive information was stored. The incident was not a temporary glitch but a result of a configuration error that allowed public access to the data [104182]. The breach was described as a 'dangerous exposure' by the security consultant who discovered it, indicating a serious and ongoing issue rather than a temporary one. (b) The incident could also be considered temporary in the sense that the data was exposed for a period of time before being secured. The security consultant mentioned that the data was 'most likely part of NSW RMS infrastructure' and that it is now secured, implying that the exposure was not a continuous state but rather a situation that existed for a certain duration before being rectified [104182].
Behaviour omission, value, other (a) crash: The incident described in the articles does not specifically mention a system crash where the system loses state and stops performing its intended functions. (b) omission: The software failure incident in the articles can be categorized under omission as the system omitted to secure the sensitive data properly, leading to the exposure of over 50,000 scanned driver's licenses and toll notices [104182]. (c) timing: The incident does not relate to a timing failure where the system performs its intended functions but at the wrong time. (d) value: The software failure incident can be attributed to a value failure as the system failed to protect the personal information stored in the Amazon cloud storage service, allowing public access to phone numbers, addresses, birth dates, and scanned images of driver's licenses [104182]. (e) byzantine: The incident does not align with a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior observed in this software failure incident is a misconfiguration of the Amazon S3 bucket, leading to the exposure of sensitive data. This misconfiguration allowed public access to the stored information, indicating a configuration error as a contributing factor to the incident [104182].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, theoretical_consequence (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the leak of over 50,000 driving licenses online exposed sensitive personal information such as phone numbers, addresses, birth dates, and scanned images of driver's licenses [104182]. This data breach could potentially lead to identity theft, financial fraud, and scams. Criminals could use the stolen information to apply for credit cards, loans, purchase items, and conduct various fraudulent activities, causing financial harm to the individuals whose data was exposed. Additionally, the incident highlighted the risks associated with personal information being misused by malicious actors, emphasizing the importance of safeguarding sensitive data to prevent such property-related consequences.
Domain information (a) The software failure incident involved the production and distribution of information as it led to the exposure of more than 50,000 scanned images of driver's licenses and toll notices online, including personal information such as phone numbers, addresses, and birth dates [104182]. This incident highlights the importance of securing sensitive information and the risks associated with data breaches in the information industry.

Sources

Back to List