Description

The discovery of a substantial 2 TB Kibana dashboard has sparked considerable alarm due to its accessibility for over two years. Initially detected by researchers from Cybernews in January 2023, this dataset was first noticed back in June 2021. The dashboard has been linked to tmax.co.kr, a website belonging to TmaxSoft, a part of the larger Tmax brand companies. Despite Cybernews' efforts to disclose and notify TmaxSoft about the issue, the company has not responded to emails or requests for an official comment. This negligence has allowed the dashboard, containing a plethora of exploitable information, to remain accessible. Containing over 56 million records, though with some duplicate entries, the leaked dataset contains a wide array of sensitive information. This includes details such as employee names, emails, phone numbers, employee/employment contract numbers, contents of sent attachments, metadata of sent binaries, employee IPs, user agents, URLs of accessed internal tools, and internal issue tracking messages. These leaks pose a significant threat, especially to sophisticated attackers or Initial Access Brokers, as they offer extensive internal insights. This understanding could assist attackers in better comprehending their targets, aiding in selecting employees to impersonate for accessing specific tools. Given TmaxSoft's specialization in middleware solutions and its handling of critical data, the leaked information could potentially be exploited in a supply chain attack, impacting both Tmax clients and providers. TmaxSoft's lack of response is particularly concerning because the leaked data primarily consists of company information and emails. Therefore, mitigation measures should primarily be initiated by TmaxSoft themselves. The potential repercussions go beyond individual privacy concerns, as TmaxSoft, known for its partnerships with major tech companies globally such as AWS, Google Cloud, Intel, VMware, among others, faces the risk of competitors using the exposed information for reverse engineering or discovering and exploiting vulnerabilities in their projects.