Security

Infoseccer: Private security biz let guard down, exposed 120K+ files

Assist Security’s client list includes fashion icons, critical infrastructure orgs


A London-based private security company allegedly left more than 120,000 files available online via an unsecured server, an infoseccer told The Register.

The independent security researcher claimed they had found 124,035 exposed files back in October, totalling 46.48 GB in size and containing details such as PII, payroll data, job application forms, TrustID validated documents, Security Industry Authority (SIA) cards, and more.

The researcher, whose requested term of address is JayeLTee, claimed they additionally found invoices dating back to 2005 and applications for guard jobs, complete with applicants' personal data and national insurance numbers, headshots, and details of their assignments. One example they saw was an employee induction report.

According to Assist Security's website, the company has provided services to the likes of major hospitals in the capital, national rail operators, and high-end fashion brands.

"It's hard to get the full scope of what was exactly exposed," said JayeLTee. "The server contained hundreds of directories, a lot of them related to specific individuals. 

"This included data of people who started the application process and quit or got denied eventually so some people had more data exposed than others depending on where the process stopped. People who were approved would have more exposed, that could include things such as payroll data."

Speaking to The Register, JayeLTee claimed that none of the vetting files related to guards on the company payroll were encrypted, and they said data also appeared to be stored after individuals either resigned or had their applications rejected.

JayeLTee said the data all related to a backup generated around August 2023. They discovered the exposed server on October 23, 2024, and said Assist closed the access six days later, after the researcher reported it.

There is no evidence to suggest that the server was left unprotected for any longer than that period, although Assist didn't prove otherwise using logs, per the researcher's request.

JayeLTee claimed: "The information on this server was quite sensitive and very high risk in the hands of the wrong people, and the fact that the company never asked me for any IP I used to access the data, or what I even accessed, combined with them telling me this was just the file structure made me doubt they had checked any logs."

The Register contacted Assist Security for a response to JayeLTee's report.

It said: "On receipt of information regarding the allegedly exposed files, immediate corrective action was taken. We are grateful to the ethical hacker for their diligence in bringing this matter to our attention. At the time our initial assessment determined that our corrective measures were sufficient to mitigate any risk."

It added:

In light of new information we have received, we continue to engage with the ethical hacker to understand the extent of data they may have unlawfully exfiltrated and be retaining. This includes working with them seeking to ensure the secure deletion of any unlawfully retained data and further reviewing the facts to determine if notifications to regulatory bodies, such as the ICO, impacted individuals or law enforcement are warranted.

It added: "We remain committed to maintaining the trust of our staff, clients and stakeholders and will take all appropriate steps based on the outcome of this ongoing investigation."

The Register has confirmed with the Information Commissioner's Office's (ICO) that the data protection watchdog has not received a report from Assist.

While Assist's unprotected data would meet the ICO's definition of a personal data breach, the watchdog does say that not every breach need necessarily be reported.

Generally speaking, notifiable breaches are ones that have a reasonable chance of affecting the data subjects' rights and freedoms. Therefore, if Assist were able to confirm internally that the files had not been accessed by a malicious third party, then the incident wouldn't necessarily have to be reported. ®

Send us news
14 Comments

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Turbulence at UN aviation agency as probe into potential data theft begins

Crime forum-dweller claims to have leaked 42,000 documents packed with personal info

Telemetry data from 800K VW Group EVs exposed online

PLUS: DoJ bans data sale to enemy nations; Do Kwon extradited to US; Tenable CEO passes away; and more

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

GoDaddy slapped with wet lettuce for years of lax security and 'several major breaches'

Watchdog alleged it had no SIEM or MFA, orders rapid adoption of basic infosec tools

Snyk appears to deploy 'malicious' packages targeting Cursor for unknown reason

Packages removed, vendor said to have apologized to AI code editor as onlookers say it could have been a test

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances