Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Dow Jones Watchlist Found Exposed to Open Internet

The Dow Jones Watchlist, a dataset of 4.4 Gigabytes, was found exposed in an unprotected Elasticsearch database on an AWS server. The Watchlist is used by many of the world’s largest organizations as part of their due diligence for both large and small contracts and transactions. While it contains the financial status of companies, it also includes sensitive information about individuals.

The Dow Jones Watchlist, a dataset of 4.4 Gigabytes, was found exposed in an unprotected Elasticsearch database on an AWS server. The Watchlist is used by many of the world’s largest organizations as part of their due diligence for both large and small contracts and transactions. While it contains the financial status of companies, it also includes sensitive information about individuals.

Researcher and security consultant Bob Diachenko discovered the database on February 22, 2019, and informed Dow Jones on the same day. It was rapidly taken down, and Dow Jones announced, “This data is entirely derived from publicly available sources. At this time our review suggests this resulted from an authorized third party’s misconfiguration of an AWS server, and the data is no longer available.”

But Diachenko had already seen it. He had potentially downloaded it, and possibly shared at least portions with TechCrunch — who wrote, “Many of those on the list include ‘special interest persons,’ according to the records in the exposed database seen by TechCrunch.”

Diachenko himself announced, “it contained the identities of government officials, politicians and people of political influence in every country of the world. The data is designed to help identify risks when researching an individual and efficient due diligence. Obviously, banks use Watchlist data to identify money laundering and illicit payments through key information about a public figureís identity.”

The database comprised 2,418,862 records, including politically exposed persons, government sanction lists, persons linked to or convicted of high-profile crimes, and notes sourced from federal agencies and LEAs. Each record specified one or more lists to categorize the subject — such as ‘Special Interest Person’. Since the database is international in nature it will undoubtedly include politicians and citizens of the European Union. It remains to be seen whether European data regulators will consider this exposure to be a breach of GDPR (Dow Jones lists offices in London, Paris, Berlin and Barcelona).

Robert Prigge, president at Jumio, thinks the leak should not be considered ‘earth-shattering’. “The lists of politically exposed persons, terrorists and convicted cybercriminals are compiled and curated from a variety of third-party databases,” he said. “These lists are then used by a variety of companies including Dow Jones, Thomson Reuters (now Refinitiv), and ComplyAdvantage, so the actual exposure of 2.4 million records of high-risk individuals and business entities may not be as critical or earth-shattering as other breaches involving less visible end-consumers and where usernames, passwords and other personal information is compromised.”

He added, “That’s not to say that this data won’t creep into the dark web — it probably will — but the impact to the Average Joe will probably be less.”

Carl Wright, CCO at AttackIQ, is more concerned. “There may be people on the list that are innocent,” he says, “and the risky individuals are now aware they are on the list and can change their tactics to avoid detection in the future.”

Advertisement. Scroll to continue reading.

“Dow Jones’ exposed database,” adds Anurag Kahol, CTO and founder at Bitglass, “contained sensitive details on current and former politicians, alleged and convicted criminals, citizens with possible terrorist links, companies facing sanctions, and organizations convicted of high-profile crimes. Leaving this information unprotected is both careless and irresponsible ñ as is failing to address the issue in detail with the public.”

Databases left unprotected on AWS servers are not uncommon. The problem is that they are not difficult to find — Diachenko suggests, “any public IoT search engine, such as BinaryEdge.” There are also commercial products that will highlight a company’s unprotected cloud instances. The problem in this case appears to have come from an authorized third-party, such as a contractor; so, Dow Jones itself may have been unaware of the existence of this copy of the database.

That would not affect any potential GDPR action. Dow Jones would remain the data controller and would remain responsible for the data.

Related: Elasticsearch Clusters Under Attack From Multiple Hacking Groups 

Related: Elasticsearch Instances Expose Data of 82 Million U.S. Users 

Related: Massive Breach at Data Broker Exactis Exposes Millions of Americans 

Related: Amazon S3 Bucket Exposed GoDaddy Server Information 

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...