Added: Britta Morganti - Date: 09.08.2021 10:36 - Views: 44735 - Clicks: 5216
A data analytics contractor employed by the Republican National Committee RNC left databases containing information on nearly million potential voters exposed to the internet without security, allowing anyone who knew where to look to download it without a password. The databases were part of 25 terabytes of files contained in an Amazon cloud that could be browsed without logging in. The was discovered by researcher Chris Vickery of the security firm UpGuard. The files have since been secured.
The accessible files, according to UpGuard, contain a main million-entry database with names, addresses of voters and an "RNC ID" that can be used with other exposed files to research individuals.
For example, a gigabyte file of "Post Elect " information, last updated in mid-January, contained modeled data about a voter's likely positions on 46 different issues ranging from "how likely it is the individual voted for Obama inwhether they agree with the Trump foreign policy of 'America Https floridaresidentdb com and how likely they are to be concerned with auto manufacturing as an issue, among others.
UpGuard speculates that the folder may imply that the firm TargetPoint compiled and shared the data with Deep Root. Another folder appears to reference Data Trust, another contracted firm. UpGuard analyst Dan O'Sullivan looked himself up in the database and writes in the official report that the calculated preferences were, at least for him, right on the money. The Deep Root Analytics cloud server had 25 terabytes of data exposed, including 1. Over the election season, the RNC was a major client of Deep Root, one of a handful firms it contacted for big data analysis.
Firms like Deep Root Analytics use data from a variety of sources to extrapolate social and political preferences of voters to determine how best to market to them. The data accessed was Https floridaresidentdb com built for or used by any specific client.
It is our proprietary analysis to help inform local television ad buying," said Deep Root Analytics in their statement. Misconfigured cloud servers and online databases are a common way for data to be accidentally left exposed to the public. Vickery has found everything from military engineering plans to databases of believed terrorists in exactly this way. What is uncommon in this case is the size and scope of this exposure.
If its records are accurate, the Deep Root Analytics exposure contains information on more than half of the American population. It dwarfs the second-largest exposure of voter information — Anyone who knew the files' web address could have accessed them.
But without that knowledge, they are much harder to find. Even armed with a search for unsecured databases, finding exposures of any magnitude is tough work. Vickery sifts through a large of unsecured databases to find ones that interesting enough to publish research. Deep Root has contracted the security firm Stroz Friedberg to perform a thorough investigation of the exposure. The exposure, between June 1 and June 14, was sealed shut shortly after Vickery made the discovery during the night of June 12 and notified relevant regulatory bodies.
View the discussion thread. Vickery is a prominent researcher in uncovering improperly secured files online. But, he said, this exposure is of a magnitude he has never seen before. In terms of the scope and depth, this is the biggest one I've found," said Vickery. Don't miss a brief. Your. Contributors Become a Contributor.Https floridaresidentdb com
email: [email protected] - phone:(101) 137-5630 x 2703
Florida Resident Database