Viacom
Hackers were given a gift when media company Viacom put private information and a secret access key in an unprotected Amazon AWS S3 bucket.
Seventy-two compressed.tgz files were found in the Amazon AWS S3 bucket under the name "MCS," which seems to be the name of Viacom's Multiplatform Compute Services division, which manages the company's IT infrastructure.
A gigabyte's worth of configuration data and login passwords for the backend of several Viacom properties were made public via the cloud storage.
The integrity of Viacom's digital infrastructure was seriously jeopardised when the keys to a media kingdom were left openly available on the internet, according to analysis of the Viacom breach.
Source: https://securityaffairs.com/63201/data-breach/viacom-data-leak.html
"id": "VIA228111223",
"linkid": "viacom",
"type": "Breach",
"date": "09/2017",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization’s existence"