On 01 Jun 2021, Nucleus Software Exports announced that they had received a ransomware demand after identifying a breach on their server. Nucleus Software is an Indian IT company in the Banking and Financial Services sector, which has a number of high-profile banks and financial institutions among its clients.
The CloudSEK Threat Intelligence Research team set out to investigate the possible initial attack vectors that could have led to the compromise. During the course of our research, we identified GitHub repositories containing sensitive documents that could have led to the attack on Nucleus Software. We also discovered that this repository had documents related to other organizations, one of which was Domino’s India (Jubilant Foods). Domino’s India also disclosed a data breach recently, after posts advertising their data cropped up across various forums.
The organizations whose data is present in the GitHub repositories include:
The documents in the GitHub repositories had sensitive information such as:
As mentioned, it was the discovery of exposed GitHub repositories belonging to a single user that led to us recognizing that a slew of recent attacks could potentially be related. These GitHub repositories belong to an ex-employee of Padah Solutions. Padah Solutions is a Business Process Management company that provides IT consulting and services for products such as Zendesk and Atalassian (JIRA). And Padah Solutions appears to be a current or past vendor for companies that have been impacted recently.
The proximity of the attacks on Jubilant Foods and Nucleus Software, combined with the fact that both companies’ sensitive data was found in GitHub repositories belonging to one user, it is likely that the attacks were perpetrated by the same threat actors/ group. Given the nature of attacks carried out on Jubilant and Nucleus, the following two scenarios are possible:
In either scenario, the threat actor could be selecting easy victims by scouring GitHub repositories and other sources for exposed credentials and other sensitive data. In light of these attacks, we recommend that all organizations monitor and secure their internet facing assets and data on a regular basis.
*Note: The names of these companies have been withheld since they have not disclosed any attacks or breaches at the time of publication of this article.
Sign up so that you don't miss any updates from us
Didn't Find what you are looking for search here