“The fact that the information was wide open indicates that whoever was behind this had no security background, was not a sophisticated hacker,” Yuval Ben-Itzhak, CTO, Finjan, told SCMagazineUS on Tuesday. “He was probably using a malware toolkit he purchased.”
According to a report from Finjan, the server was located in Malaysia, but contained data from all around the world, including North America, Europe and Asia. The server was up only three weeks, but was able to collect 1.4 GB of data. The compromised data was detected using active real-time code inspection technology while diagnosing a user's web traffic.
The Finjan report, available here, contains examples of compromised data such as bank customer data, email communications and patient data.
Ben-Itzhak told SCMagazineUS.com that the server was shut down two days after the find was reported. However, the criminal behind it has not been found. The server contained 5,388 unique log files traced back to 5,878 distinct IP addresses.
Alarming too was that some of the data was HIPAA related. The exposure of the HIPAA data to criminal elements compromises not only the patient, but also the medical institution/health care provider involved, as well as employees of the institution.