770 million logs compromised at Travis CI API

B2B Cyber ​​Security ShortNews

Share post

More than 770 million Travis CI API logs are potentially compromised. The free version of the popular CI/DE tool has a new vulnerability and allows access to tokens, user data and passwords.

Team Nautilus, Aqua Security's research unit specializing in the cloud-native technology stack, has discovered a new vulnerability in the free version of the Travis CI API, a popular CI/CD tool. The vulnerability easily accesses over tens of thousands of user credentials, tokens and other credentials from potentially up to 770 million free version user logs.

770 million logs visible

Travis CI access keys and credentials are linked to popular cloud service providers such as GitHub, AWS, Docker Hub and many others. Attackers can access historical plaintext logs through the vulnerability and use this sensitive data to launch massive cyberattacks and move sideways in the cloud. Some of these cloud service providers confirmed that up to 50 percent of the associated Travis CI tokens, user credentials and passwords shared with them were still valid and allowed access to their customers' accounts.

Known since 2015 - still problems

According to Travis CI, this issue was previously reported in 2015 and most recently in 2019 and subsequently resolved. But as the recent investigations by Team Nautilus clearly show, it's still a serious problem. Nautilus found that the valid range of logs is from 4.280.000 to 774.807.924, meaning there are potentially more than 770 million compromised logs. The oldest logs are from January 2013 and the newest from May 2022.

🔎 Percentage of compromised logs per cloud service provider (Image: Aqua Security).

Recommendation: Change the Travis CI API key immediately

This threat could lead to an increase in attacks on the software supply chain, an already critical issue. Although Team Nautilus also found potential access to restricted logs, Travis has no further plans at this time. Therefore, Nautilus recommends changing all Travis CI API keys immediately. Aqua Security has communicated the findings about the vulnerability to the respective service providers. Almost all of them were alarmed and reacted quickly. Some prompted extensive key exchanges. Aqua Security published a detailed blog article describing the vulnerability.

More at Aquasec.com

 


About Aqua Security

Aqua Security is the largest pure cloud native security provider. Aqua gives its customers the freedom to innovate and accelerate their digital transformation. The Aqua platform provides prevention, detection, and response automation across the application lifecycle to secure the supply chain, cloud infrastructure, and ongoing workloads—regardless of where they are deployed.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more