LexisNexis in the eye of the hurricane by filtration that exposes historical data and cloud failures

Published 5 min de lectura 118 reading

The American firm LexisNexis Legal & Professional - known for providing information, research and analytical tools to offices, companies, governments and universities around the world - has confirmed unauthorized access to part of its servers, according to specialized reporter. The incident came to light after an actor called FulcrumSec published a overturn of about 2 GB in forums and sites of the underground network, attributed to the exfiltration of data housed in the company's infrastructure.

The company recognizes the intrusion, but ensures that the information taken from it corresponds mostly to inherited data and not to sensitive active data. The communication LexisNexis provided to the media indicates that the affected files contained pre-2020 records and files, with elements such as customer names, user identifiers, commercial contacts, surveys and support tickets. According to the company, there is no record of the commitment of social security numbers, financial data, active passwords, customer searches, or existing records or contracts.

LexisNexis in the eye of the hurricane by filtration that exposes historical data and cloud failures
Image generated with IA.

On the other hand, the FulcrumSec group has published technical details about the operation and the magnitude of what they claim to have been obtained. In their announcement they mention having exfiltered "2.04 GB" of structured data and describe access to Redshift's instances, numerous VPC database tables, AWS Secrets Manager's secrets in flat text, millions of records and tens of thousands of customer accounts, as well as cloud infrastructure maps and employee passwords hashes. They also claim that among the profiles that were removed there were more than a hundred .gov domain mail addresses, including accounts linked to federal employees, members of the judiciary and staff of agencies such as the Department of Justice and the SEC.

According to the attacker's account, the gap occurred from the exploitation of a vulnerability in a React-based front application that had not been patched, which would have allowed access to a container task with permission to interact with the AWS infrastructure. This description highlights a chain of failures: from lack of software update to excessive cloud role permits, which can turn an apparently "customer-side" vulnerability into an entry path to critical corporate data.

The cloud architecture requires rigid security controls and the principle of minimum privilege. When a container task (ECS task role in AWS) has extensive permissions to read secrets or to manage databases, a operation of a deployed application can quickly scale up to deeper commitments. AWS provides documentation on best practices for task roles and secret management that help mitigate these risks; it is useful to review it to understand impact reduction measures in similar environments ( task roles in ECS, AWS Secrets Manager, Amazon Redshift).

LexisNexis has notified security forces, hired external cyber security experts for research and containment, and reported the situation to both current and old customers. In its public response the company stresses that, according to its investigations, the intrusion was contained and there was no impact on the products and services in use. Meanwhile, the group that released the data specifically criticized access practices and permits in the AWS account which, according to its version, allowed the reading of critical secrets from a single task in containers.

For individuals and organizations that may be involved, the first recommendation is to act with caution: although LexisNexis states that the sensitive elements were not affected, the presence of .gov addresses and contact data implies a reputational and operational risk. It is appropriate to strengthen monitoring of targeted phishing attempts, to monitor unusual access to related accounts and, where appropriate, to force the restoration of old credentials, to activate multifactor authentication and to review permissions and alerts in cloud services.

This episode also illustrates a broader lesson about data providers and trusted models. Companies that add information and make it available to third parties become attractive targets for attackers: a leak can affect customers, employees and third parties linked by a chain of use. This is why it is key for suppliers to implement full-cycle security policies: web-based applications hrending, urgent updates to vulnerabilities, network segmentation, rotation and strict encryption of secrets, and regular audits of cloud permissions. Public cybersecurity agencies recall the importance of these measures and offer guides and resources for risk management in connected environments ( CISA).

LexisNexis in the eye of the hurricane by filtration that exposes historical data and cloud failures
Image generated with IA.

The incident does not come in vacuum for LexisNexis: the previous year the company reported another intrusion that affected hundreds of thousands of customers. For its users and for any organization dependent on external suppliers, the accumulation of similar episodes underlines the need to demand transparency, contractual security controls and regular resilience tests. Suppliers should be able to demonstrate not only that they detect and respond to incidents, but that they minimize the possibility that a failure in a component will allow critical data to be compromised transversal.

For those who want to deepen the journalistic coverage of this event, the first reports that have followed history and that reflect both the confirmation of LexisNexis and the publication of the group that was awarded the intrusion are found in specialized security media, as BleepingComputer. Also, reviewing the technical documentation of cloud providers can help to understand the vectors that often facilitate such incidents and the specific measures to mitigate them.

In short, although the company tries to reassure itself that the committed data are mostly historical and do not contain financial information or active passwords, the publication of the material by third parties and the allegations about the scope and profiles involved require that attention be maintained. In the field of cybersecurity, caution and proactive action remain the best defenses for the possibility that apparently "harmless" data will become levers for more sophisticated attacks.

Coverage

Related

More news on the same subject.