Skip to content

The File That Contained the Keys Has Been Removed: An Empirical Analysis of Secret Leaks in Cloud Buckets and Responsible Disclosure Outcome

This is a draft agenda: changes are still being made.

Speaker:
Yury Zhauniarovich (TU Delft)
Date:
Time:
Room:
Side Room
Session:
Security
Duration:
25 min
Transcript:
Not Available
Meetecho chat:
Not Available
Type:
Talk
Slides:
Add to calendar

Abstract

As cloud adoption accelerates, the operational risks associated with misconfigured storage services like AWS S3, Google Cloud Storage, and Azure Blob Storage continue to grow. One critical but often overlooked threat is the leakage of sensitive secrets -- such as API keys, database credentials, and access tokens -- through publicly exposed configuration files.

In this talk, we present findings from a large-scale scan of publicly accessible cloud buckets, where we identified 215 real-world cases of exposed secrets. These leaks granted unauthorized access to critical infrastructure, third-party APIs, and internal services, illustrating how simple misconfigurations can lead to severe operational and reputational damage.

Within this presentation, we will walk through the types of files and secrets most commonly exposed, demonstrate how they were detected non-intrusively, and share insights into the incident response patterns across different organizations. Importantly, we will discuss our coordinated disclosure efforts, which led to the remediation of 95 cases, and highlight the challenges in driving action even after vulnerabilities are reported.

This session will equip operators, security teams, and cloud engineers with practical recommendations to audit their own storage environments, avoid common pitfalls, and build more resilient disclosure and remediation workflows.

Recording

Video will be added soon.

Speaker

Yury Zhauniarovich

Yury Zhauniarovich

Dr. Yury Zhauniarovich is an Assistant Professor in Cybersecurity at the Technology, Policy and Management (TPM) faculty at TU Delft. Previously, he worked both in industry and academia. He is interested in network measurements, mobile security, and security data analytics.

Add to calendar