Data belonging to customers of MBIA Inc., the largest bond insurer in the United States, was inadvertently made available online due to a misconfigured Web server.
MBIA is a Purchase, New York-based holding company that provides financial guarantee insurance, fixed-income asset management, and other financial services through its subsidiaries. The company was founded in 1973 as the Municipal Bond Insurance Association.
Customer names, account and routing numbers, balances, dividends and other information from mbiaweb.com was made publicly accessible and it was even indexed by search engines because of an Oracle Reports database server that wasn’t configured to ensure that only authorized users could access data, security blogger Brian Krebs reported.
The affected website, which has been taken down after MBIA learned of the data leak, stored customer information from Cutwater Asset Management, a fixed-income unit of MBIA which is set to be acquired by BNY Mellon Corp. Google indexed 230 pages of account statements for entities such as Texas CLASS, the Town of Richmond, NH, Connecticut CLASS Plus, and the New Hampshire Public Deposit Investment Pool, Krebs said.
In addition to account information, some of the exposed documents also contained details on how to authorize new bank accounts for deposits.
MBIA says the affected server has been taken offline and an investigation has been launched. The company has started notifying customers about the incident, but it refused to state precisely how many are affected.
“We have been notified that certain information related to clients of MBIA’s asset management subsidiary, Cutwater Asset Management, may have been illegally accessed. We are conducting a thorough investigation and will take all measures necessary to protect our customers’ data, secure our systems, and preserve evidence for law enforcement,” MBIA spokesman Kevin Brown told SecurityWeek.
Independent security expert Bryan Seely, the individual who discovered the leaked data, noted that an Oracle Reports diagnostics page was also accessible on the misconfigured server. The page in question included login credentials that could be used to access all the customer data hosted on the server.
“Billions in taxpayer funds, invested into one of the largest institutions in the world that were essentially being guarded by a sleeping security guard. What happens to those states when the money disappears?” Seely said.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
- Verizon 2023 DBIR: Human Error Involved in Many Breaches, Ransomware Cost Surges
- Google Patches Third Chrome Zero-Day of 2023
- Ransomware Group Used MOVEit Exploit to Steal Data From Dozens of Organizations
- Cybersecurity M&A Roundup: 36 Deals Announced in May 2023
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
Latest News
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
- OWASP’s 2023 API Security Top 10 Refines View of API Risks
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
