Time Warner Cable freelancers managing online apps left the AWS S3 storage, which included subscriber data, vulnerable.
According to Kromtech, independent contractors that managed online applications for Time Warner Cable (TWC) and other businesses ignored the AWS S3 storage that held subscriber data.
In addition to phone numbers, usernames, MAC addresses, modem hardware serial numbers, account numbers, contact information, and other billing details, the exposed customer records also included addresses and phone numbers.
TWC is informing affected customers of the data leak.
Source: https://securityaffairs.com/62752/data-breach/time-warner-cable-data-leak.html
TPRM report: https://scoringcyber.rankiteo.com/company/time-warner-cable
"id": "tim43791223",
"linkid": "time-warner-cable",
"type": "Data Leak",
"date": "09/2017",
"severity": "60",
"impact": "3",
"explanation": "Attack with significant impact with internal employee data leaks"
{'affected_entities': [{'industry': 'Telecommunications',
'name': 'Time Warner Cable',
'type': 'Company'}],
'attack_vector': 'Misconfigured AWS S3 bucket',
'customer_advisories': 'TWC is informing affected customers of the data leak.',
'data_breach': {'type_of_data_compromised': ['Customer records',
'Phone numbers',
'Usernames',
'MAC addresses',
'Modem hardware serial numbers',
'Account numbers',
'Contact information',
'Billing details',
'Addresses']},
'description': 'Time Warner Cable freelancers managing online apps left the '
'AWS S3 storage, which included subscriber data, vulnerable.',
'impact': {'data_compromised': ['Customer records',
'Phone numbers',
'Usernames',
'MAC addresses',
'Modem hardware serial numbers',
'Account numbers',
'Contact information',
'Billing details',
'Addresses']},
'references': [{'source': 'Kromtech'}],
'response': {'communication_strategy': 'TWC is informing affected customers '
'of the data leak.'},
'title': 'Time Warner Cable Data Leak',
'type': 'Data Leak',
'vulnerability_exploited': 'Misconfigured AWS S3 storage'}