Connect with us

Hi, what are you looking for?


Cloud Security

Provider of Data Integration Services for Fortune 100 Firms Exposed Sensitive Files

Attunity, a Qlik-owned data integration and big data management company whose solutions are used by over 2,000 enterprises and half of the Fortune 100 firms, exposed a significant amount of sensitive data through unprotected Amazon S3 buckets.

Attunity, a Qlik-owned data integration and big data management company whose solutions are used by over 2,000 enterprises and half of the Fortune 100 firms, exposed a significant amount of sensitive data through unprotected Amazon S3 buckets.

On May 13, a researcher at cyber resilience company UpGuard came across three unprotected AWS cloud storage buckets belonging to Attunity. An analysis revealed that the buckets had stored a vast amount of data — the exact size was not determined, but a one-terabyte sample was downloaded for analysis — including email backups, business documents, and employee OneDrive account backups containing emails, passwords, project specifications, and marketing and sales contact information.

The exposed buckets also stored customer-related information. Some examples provided by UpGuard include Netflix database authentication strings, an invoice for a TD Bank software update, and slides describing a project for car maker Ford.

In the exposed files, UpGuard also discovered credentials for Attunity systems and its corporate Twitter account, and employee personal information, including names, salary, date of birth, and employee ID numbers. Researchers determined that the employee IDs might actually be social security numbers.

The oldest files were uploaded to the storage buckets in September 2014 and the most recent were uploaded just days prior to UpGuard’s discovery. However, the cybersecurity firm says it’s unclear when these files actually became publicly accessible. UpGuard informed the vendor of its findings on May 16 and the exposed buckets were secured shortly after.

Qlik, which acquired Attunity earlier this year for $560 million, told SecurityWeek that Attunity customers deploy and operate the software directly in their own environments, and the company doesn’t actually store or host sensitive customer data.

“Following Qlik’s acquisition of Attunity in May, and upon becoming aware of the issue, Qlik applied its security standards and best practices to the Attunity environments, including monitoring by Qlik’s 24×7 security operations center,” Qlik said via email.

Advertisement. Scroll to continue reading.

“We are still in the process of conducting a thorough investigation into the issue and have engaged outside security firms to conduct independent security evaluations. We take this matter seriously and are committed to concluding this investigation as soon as possible. At this point in the investigation, indications are that the only external access to data was by the security firm that contacted us,” the company added.

Related: Misconfigured Server Leaks Oklahoma Department of Securities Data

Related: Amazon S3 Bucket Exposed GoDaddy Server Information

Related: Data Aggregator LocalBlox Exposes 48 Million Records

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...


The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Incident Response

Microsoft has rolled out a preview version of Security Copilot, a ChatGPT-powered tool to help organizations automate cybersecurity tasks.