A publicly accessible server belonging to Level One Robotics and Controls exposed 157 GB of highly sensitive data from hundreds of companies, including Tesla, Toyota and Ford. Credit: Thinkstock A security researcher discovered 157 GB of highly sensitive data from more than 100 companies, including automakers such as Ford, GM, Tesla, Toyota, Chrysler, Fiat, and Volkswagen, exposed on the web. The data stored on the publicly exposed backup server belonging to the Canadian company Level One Robotics and Controls required not even so much as a password to access.UpGuard security researcher Chris Vickery, who discovered the unsecured data, classified the exposed data into three categories: customer, employee and Level One data. UpGuard said the publicly accessible data included nearly 47,000 files dealing with 10 years of assembly line schematics, factory floor plans and layouts, as well as robotic configurations, animations and documentation.The enormous breach also included VPN access request forms, nondisclosure agreements (NDAs), ID badge request forms, and scans of some Level One employees’ driver’s licenses and passports, which would be handy for social engineering, fraud, and identity theft. Level One business data ranging from contracts to account and routing numbers and even SWIFT international bank codes were also exposed.Documents exposed via rsync file transfer protocolThe unsecured trade secrets and corporate documents had been exposed via the file transfer protocol rsync. UpGuard wrote, “The rsync server was not restricted by IP or user, and the data set was downloadable to any rsync client that connected to the rsync port. The sheer amount of sensitive data and the number of affected businesses illustrate how third- and fourth-party supply chain cyber risk can affect even the largest companies. The automation and digitization of manufacturing has transformed the industry, but it has also created a new area of concern for industries, and one that must be taken seriously for organizations to thrive in a healthy digital ecosystem.” Not only could anyone connect to Level One’s rsync server, but it was also “publicly writable, meaning that someone could potentially have altered the documents there, for example replacing bank account numbers in direct deposit instructions, or embedding malware.”The exposed rsync server was discovered on July 1. Attempts to contact Level One started on July 5, but contact wasn’t established until July 9. The exposure was closed within a day, by July 10. Level One is reportedly investigating the “alleged data exposure.” The company’s chief executive, Milan Gasko, told The New York Times that is was “extremely unlikely” that anyone else besides Vickery had viewed the data, but he declined to comment on whether there were tools in place to detect unauthorized access.The automotive giants affected by the breach also would not comment.“The supply chain has become the weakest part of enterprise data privacy,” UpGuard concluded. Companies that spend many millions a year on cybersecurity can still be exposed by a vendor who handles their data. The complexity of the supply chain involves a sprawl of third and fourth-parties who handle corporate data sets. All of these vendors have their own processes and systems that determine how well the data is protected. Organizations and their vendors must have standardized deployment processes that create and maintain assets securely, reducing the likelihood of a data incident. If this security is not built into the processes themselves, there will always be misconfigurations that slip through and lead to data exposure. They must also have an exposure response plan, so that when they are affected, they can act quickly to remediate, as Level One did in this case. Level One Robotics works with clients and other vendors, as necessitated by the robotics manufacturing and sales process. While such an ecosystem can make for great efficiencies and scale, it also opens the entire chain up to risk when a single link faces an exposure. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe