WTF? CISA Admin Leaked AWS GovCloud Keys on Github 

A newly uncovered GitHub exposure involving a CISA contractor leaked privileged AWS GovCloud credentials, plaintext passwords, and internal DevSecOps infrastructure details in what researchers are calling one of the most severe public-sector secret leaks in recent memory.

Dan Moore, Sr. Director, CIAM Strategy & Identity Standards at FusionAuth had this comment:

“A public GitHub repo sat open for six months. AWS GovCloud admin keys. Plaintext passwords. The works.

Researchers at Seralys and KrebsOnSecurity flagged it to CISA and were ignored. When the repo finally came down, the AWS keys stayed live for another 48 hours.

The hygiene failure created the exposure. Ignoring responsible disclosures extended it. But the static, long-lived credentials are the architectural problem that underlies both of those issues. An exposed static secret stays leaked until someone manually kills it. That’s a design error, not a simple mistake.”

This is an epic #fail by a group that should know better. Seriously, heads need to roll over this.

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading