Sega left a huge database of user information open to hackers

Tajammul Pangarkar
Tajammul Pangarkar

Updated · Dec 31, 2021

SHARE:

Scoop.market.us is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more.
close
Advertiser Disclosure

At Market.us Scoop, we strive to bring you the most accurate and up-to-date information by utilizing a variety of resources, including paid and free sources, primary research, and phone interviews. Our data is available to the public free of charge, and we encourage you to use it to inform your personal or business decisions. If you choose to republish our data on your own website, we simply ask that you provide a proper citation or link back to the respective page on Market.us Scoop. We appreciate your support and look forward to continuing to provide valuable insights for our audience.

Sega Europe could have easily fallen victim to a data breach as security researchers recently discovered that the company had left sensitive files stored insecurely on a publicly accessible database.

Researchers at the security firm VPN Overview found the files in question stored on a misconfigured Amazon Web Services (AWS) S3 bucket. They were also able to obtain multiple sets of AWS keys that gave them read and write access to Sega Europe's cloud storage.

In addition to sensitive files, the misconfigured S3 bucket contained was also used to host websites for a number of popular Sega properties including Sonic the Hedgehog, Bayonetta, Football Manager and Total War as well as Sega's official site. In total, 26 public-facing domains controlled by Sega Europe were affected.

VPN Overview's researchers were able to upload files, execute scripts, alter existing web pages and modify the configuration of critically vulnerable Sega domains according to a new report.

Compromised email and cloud services

During its investigation, VPN Overview's security team recovered an API to the email marketing software MailChimp that gave it the ability to send emails from the address [email protected].

The team then sent multiple messages to test its access and every email it sent appeared legitimate and also used TLS encryption. From here, the researchers were able to alter existing MailChimp templates and even create their own. As all of the emails sent out to Football Manager users appeared legitimate and would be able to bypass email security checks, a malicious attacker could have used this access to launch phishing campaigns.

VPN Overview was also able to upload and replace files on three of Sega's content delivery networks (CDNs). As third-party websites often link to a company's CDN for an official version of an image or file, 531 additional domains were linked to Sega Europe's affected CDNs. As a result, an attacker could have abused the company's CDNs to distribute malware and ransomware to unsuspecting users.

After discovering Sega Europe's misconfigured S3 bucket, VPN Overview responsibly disclosed its findings to the company which then secured the database and all of its  affected cloud services and software.

We've also featured the best antivirus and best password manager

Source Link Sega left a huge database of user information open to hackers

SHARE:
Tajammul Pangarkar

Tajammul Pangarkar

Tajammul Pangarkar is a CMO at Prudour Pvt Ltd. Tajammul longstanding experience in the fields of mobile technology and industry research is often reflected in his insightful body of work. His interest lies in understanding tech trends, dissecting mobile applications, and raising general awareness of technical know-how. He frequently contributes to numerous industry-specific magazines and forums. When he’s not ruminating about various happenings in the tech world, he can usually be found indulging in his next favorite interest - table tennis.