Welcome back all for another article in CPG’s cyber attack of the week series! Today, we are diving into a recent attack somewhere across the world.
Security researchers recently discovered roughly 50,000 New South Wales driver’s licenses and other connected documents in an unsecured Amazon server.
NSW Faces Attack on Driver’s Licenses
To begin, this particular attack is so recent, that coverage and available information on the attack is scarce. But, that is what we are here for at CPG; ready to uncover and review any and all details surrounding the attack.
Recently, security researcher Bob Diachenko discovered the misconfigured s3 bucket online. He took to Twitter to address the issue.
More than 50K scanned driver licenses (front+back) and toll notices exposed in a misconfigured S3 bucket. Most likely – part of NSW RMS infrastructure (Road and Maritime, New South Wales, Australia). Secured now. No official response though. Thanks to @troyhunt for assistance. pic.twitter.com/FRTQ5GEEJE
— Bob Diachenko (@MayhemDayOne) August 26, 2020
According to another source, “The leak contained 108,535 scanned images of the front and back of NSW driver’s licenses, exposing birth dates, home addresses and driver’s license numbers. Completed tolling notice statutory declarations were also found in a separate folder.”
Various security researchers also took to Twitter to address the issue and alert the Australian Cyber Security Centre.
Now secure, the security issue at hand appears to be mitigated. But, for those 50,000 people who may now be at risk, the guessing game now begins.
There is opportunity for those caught in the attack to be at risk of identity theft or other means of cyber attacks. Those put at risk may take precautionary steps such as requesting a new license to protect themselves.
All in all, as quickly as this issue came about it was resolved. Little to no coverage of this attack is currently circulating. Also, as of now, none of the victims of the attack have come forth on social media.
Further, this may be due to the fact that those in charge of the server may still be in the process of notifying those at risk.
By Taylor Ritchey