Endpoint Security , Incident & Breach Response , Managed Detection & Response (MDR)

Tech Data Says It Has Closed Off StreamOne Data Exposure

Researchers Say Logging Server Left Online Without Authentication
Tech Data Says It Has Closed Off StreamOne Data Exposure
Tech Data's headquarters in Clearwater, Fla. (Source: Tech Data)

Tech Data Corp., one of the largest distributors of hardware, software and software management services, says it has disabled a logging server used for its StreamOne cloud services marketplace after a data exposure.

See Also: Hunt Cloud Threats or Be Hunted | CISO Guide to Cloud Compromise Assessments

Researchers Noam Rotem and Ran Locar found the server was open online and did not require authentication. StreamOne is a Tech Data service designed to let cloud service resellers quickly provision and manage cloud subscriptions for their end users. TechCrunch first reported the exposure, which Tech Data says was ended within hours of it being notified.

Tech Data, based in Clearwater, Fla., has a diverse business and is a Fortune 500 company. The company, which has 14,000 employees, recorded $36 billion in net sales in 2018.

What Was Exposed?

Rotem and Locar, who blog for the company vpnMentor, write that the log management server contained personal data, email addresses, reseller contact and invoice information, payment and credit card data, internal security logs as well as unencrypted logins and passwords.

Tech Data says the log server was used to capture and store temporary information for diagnostics and troubleshooting of the StreamOne marketplace. Tech Data spokesman Bobby Eagle says the description of the information exposed is inaccurate, as the server did not contain payment card numbers or bank account details. TechCrunch reports that the payment card numbers were obfuscated.

"In addition, credentials, including passwords, necessary for logging into StreamOne or other Tech Data customer accounts were not included on the impacted server."
—Bobby Eagle, Tech Data

“In addition, credentials, including passwords, necessary for logging into StreamOne or other Tech Data customer accounts were not included on the impacted server,” Eagle says.

Rotem and Locar write that the log server comprised 264 GB if data, although they did not analyze all of it. But they allege that the exposure did reveal sensitive information that could be of use to attackers.

“With a simple search of the exposed database, our researchers were able to find the payment information, PII, and full company and account details for end-users and managed service providers (MSPs) – including for a criminal defense attorney, a utilities service provider, and more,” they write. “There were enough details in this leak wherein a nefarious party could easily access users’ accounts – and possibly gain access to the associated permissions for said accounts.”

Tech Data says, however, that no credentials for logging into either StreamOne or Tech Data customer accounts were exposed.

“While our investigation continues, we can advise that the server data may have included a combination of business data such as information found on a business card and certain other information, such as one-time-use credentials to activate a specific cloud service, and date and time of service activations,” Eagle says.

Tech Data: No Fraud Yet

Despite the apparent discrepancies over what was exposed, Rotem and Locar – who have a noted record tracking down insecure servers – complimented Tech Data on its quick response (see Canadian Mobile Provider Exposed Payment Card Numbers).

“It’s worth noting that Tech Data’s team was very professional in handling news of the leak and asked the real questions to solve the problem,” the researchers write. “We commend their expertise and dedication.”

So far, Eagle says there’s “no evidence that the data stored on the affected server was misused for any unauthorized transactions or other fraud.”

“We are continuing to investigate this incident and will satisfy all data reporting requirements, as needed,” Eagle says.

About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.