home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,727 of 2,445   
   Mike Powell to All   
   Largest US credit union l   
   04 Sep 25 08:31:47   
   
   TZUTC: -0500   
   MSGID: 1475.consprcy@1:2320/105 2d1ed086   
   PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   FORMAT: flowed   
   Largest US credit union leaked potentially sensitive information   
      
   Date:   
   Wed, 03 Sep 2025 16:16:00 +0000   
      
   Description:   
   Navy Federal Credit Union kept an unprotected backup on the open internet,   
   leaking all sorts of sensitive information.   
      
   FULL STORY   
      
   Navy Federal Credit Union (NFCU), the largest credit union in the United   
   States, was leaking sensitive information to the open web by keeping a backup   
   database unprotected and available on the wider internet. This is according    
   to Jeremiah Fowler, a cybersecurity researcher known for hunting unencrypted,   
   non-password-protected databases.    
      
   In a recent announcement, Fowler said he found an archive containing 378GB of   
   backup data. The data belongs to the largest credit union serving military   
   members and their families, and contained storage locations, keys, hashed   
   passwords, and other internal potentially sensitive information.    
      
   In a limited sampling of the exposed files, I saw internal users names, email   
   addresses, and what appeared to be hashed passwords and keys, Fowler   
   explained. The backup files also revealed what appeared to be operational   
   metadata, system logs, and business logic such as codes, product tiers,   
   optimization processes, rate structures, and other data that should not have   
   been publicly accessible.   
      
   Firmware update    
      
   NFCU serves military members, veterans, Department of Defense employees, and   
   their families with banking, loans, and financial services. It was founded in   
   1933, and according to Website Planet, holds roughly $180.8 billion in assets   
   under management, and counts 14.5 million members.    
      
   As soon as the researcher reached out to NFCU, the organization locked down   
   the database, but did not respond to the disclosure notice. Therefore, it   
   remains unknown who actually operates the backup (it could be NFCU, but it   
   could also be a third-party), for how long it remained open, and if anyone   
   accessed it before Fowler.    
      
   Despite member data not being available in plain text, there is significant   
   potential risk in exposing ancillary information, Fowler stressed.   
   Hypothetically, attackers could use internal information (such as names,   
   emails, and user IDs) to target staff or accounts with credential stuffing,   
   phishing, or other social engineering attempts, with the goal of gaining   
   further access to sensitive internal systems, files, or member data.    
      
   Therefore, customers are advised to be extra vigilant when receiving email   
   messages and other communication claiming to come from NFCU.    
      
    Via Website Planet   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/largest-us-credit-union-leaked-potentia   
   lly-sensitive-information   
      
   $$   
   --- SBBSecho 3.28-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700   
   SEEN-BY: 226/30 227/114 229/110 111 206 300 307 317 400 426 428 470   
   SEEN-BY: 229/664 700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 304 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca