I was curious what the article might be about, so off I went to Google. Slight problem though, I accidentally hit return on the keyboard before typing in the word "Zeit" and ending up searching for "Gisella Stuart Die" (unfortunate I know) and spotted a strange response at the top of the search.
![](http://1.bp.blogspot.com/_ZI9ZC-oL5KQ/SoP93YsuO8I/AAAAAAAAFJ8/mvx3LFmJt24/s400/sql.png)
So I followed the link and 'lo, it came to pass! I had in my possession the username and password for Gisela Stuart's database and probably her website CMS too - worse still it was also in Google's cache.
![](http://1.bp.blogspot.com/_ZI9ZC-oL5KQ/SoQCCj0UKtI/AAAAAAAAFK8/bZ40SrTETyI/s400/stuart1.png)
They took the matter seriously and have fixed it and changed the login credentials in less than half an hour - good work. However, there is an important lesson to be learned here.
Just think what could have happened with that information?
Update: The web design company has been in touch to advise that the cause of this problem was due to a data migration to a new platform and that 25 rogue entries which reference the previous system had leaked through the migration process and have now all been removed.
The credentials above are apparently no longer valid on any active systems and they say were not valid on the new platform after the migration. Nevertheless, the company also advised that they "take credential leaks very seriously and the system will be undergoing a security review this afternoon".
Fair play to them I say, and understandable too. Sometimes people have a tendancy to use the same password in places and this could, potentially at least, expose other sites to security failing. A review under the circumstances is perfectly sensible I'd say.
No comments:
Post a Comment