![]() ![]() The data repository, an Amazon Web Services S3 bucket administered by a NICE Systems engineer based at their Ra’anana, Israel headquarters, appears to have been created to log customer call data for unknown purposes Verizon, the nation’s largest wireless carrier, uses NICE Systems technology in its back-office and call center operations. ![]() The UpGuard Cyber Risk Team is a unit devoted to discovering data exposures where they exist, helping to secure them and raising awareness about the issues of cyber risk driving data insecurity across the digital landscape. (UPDATE: 3 PM PST - Both NICE Systems and Verizon have since confirmed the veracity of the exposure, while a Verizon spokesperson has claimed that only 6 million customers had data exposed). The cloud server was owned and operated by telephonic software and data firm NICE Systems, a third-party vendor for Verizon. UpGuard’s Cyber Risk Team can now report that a misconfigured cloud-based file repository exposed the names, addresses, account details, and account personal identification numbers (PINs) of as many as 14 million US customers of telecommunications carrier Verizon, per analysis of the average number of accounts exposed per day in the sample that was downloaded. The UpGuard Cyber Risk Team notified Verizon of this publicly exposed information and action was ultimately taken, securing the database and preventing further access. While this blog post provides a description of a data exposure discovery involving NICE Systems and Verizon, this is no longer an active data breach.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |