AI development service Builder.ai potentially exposed over 1TB of user data
Builder.ai users potentially affected by insecure storage
- Security researchers discovered a major database with 3M+ records
- It belongs to Builder.ai, a low code/no code platform
- It contains sensitive information, NDAs, and more
Builder.ai may have unwillingly exposed sensitive information on its users, researchers have claimed.
Jeremiah Fowler, a security researcher known for hunting down non-password protected databases containing sensitive intel, said he discovered an archive with more than 3 million records online.
The database belongs to Builder.ai, a British no-code/low-code platform that enables businesses to quickly and affordably create custom software applications without requiring deep technical expertise.
Complexities with dependent systems
Fowler said the database contained 3,077,542 records, totaling 1.29TB in size, including cost proposals, NDA agreements, invoices, tax documents, email correspondence screenshots, internal image files, and much more.
“Among the most concerning files were two documents that indicated access and configuration details of two separate cloud storage databases that also included secret access keys,” Fowler said on Website Planet.
“It is hypothetically possible that those access keys could have revealed additional potentially sensitive data if they were to fall into the wrong hands.”
In total, there were 337,434 invoices and 32,810 files labeled Master service agreements. The latter also contained NDA agreements with names, emails, IP addresses, project cost summaries, and other project details.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Speaking to TechRadar Pro, a Builder.ai spokesperson said the incident was not a database exposure, but rather a public-facing Azure storage container, with its egress files confirming there was no unusual download activity during this period.
The company also disagreed with Fowler's claim that sensitive data was exposed, noting the container held standard business documents, website assets and UI elements, and BuildCard PDFs, and no credentials, sensitive code or customer data were exposed.
"Our logs confirm no mass data exfiltration occurred during this period, and only the researcher accessed these files as part of the responsible disclosure process," it added.
Misconfigured databases remain one of the number one reasons for data leaks on the internet. Many researchers are warning that organizations don’t understand the shared security model present in most cloud service providers, and that they end up generating enormous databases, filled with valuable information, which are open and accessible to all.
Should cybercriminals find these archives, they could use the information there in convincing phishing attacks, identity theft, and possibly even wire fraud.
You might also like
- Watch out - that dream job offer could be a malware scam
- Here's a list of the best antivirus tools on offer
- These are the best endpoint protection tools right now
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.