5 million users
Fintech startup VoltPay has exposed the personal and financial data of 5 million customers due to a misconfigured Elasticsearch database. The database was left publicly accessible without a password for over three months, from October 2025 until its discovery by a security researcher on January 25, 2026. The exposed dataset is highly sensitive, containing full names, contact information, dates of birth, hashed passwords, and detailed transaction histories. The leak also included partial credit card and bank account numbers. The company has attributed the incident to human error during a server migration. Affected users are being notified and offered credit monitoring, but they now face a heightened risk of sophisticated phishing, fraud, and identity theft. The breach is likely to result in significant regulatory fines under GDPR and CCPA.
This incident is a classic example of a cloud security failure. A database containing production data was exposed to the public internet without any authentication controls. It remained exposed for a prolonged period (over three months), making it highly likely that malicious actors discovered and downloaded the data before it was secured. The company's admission of 'human error' points to a lack of automated security checks and configuration management in their cloud deployment processes.
The breach was not the result of a sophisticated hack, but a simple, yet critical, oversight. The primary technique involved is T1530 - Data from Cloud Storage Object. Malicious actors continuously scan the internet for open databases and storage buckets. When they find one, they simply connect and download the contents.
The exposed data included:
This combination of data is a goldmine for criminals. The transaction history allows them to craft extremely convincing, personalized phishing emails (e.g., "Regarding your recent transaction with [Merchant Name]...").
Detecting this type of exposure requires proactive security measures, not reactive IOCs.
| Type | Value | Description | Context |
|---|---|---|---|
other |
Publicly accessible Elasticsearch instance on port 9200 | Security teams should be continuously scanning their own public IP space for open database ports. | External Attack Surface Management (EASM), Shodan/Censys monitoring |
log_source |
Cloud Provider Flow Logs (e.g., AWS VPC Flow Logs) | Anomalous large data transfers from a database server to multiple unknown external IPs. | Cloud security monitoring, SIEM |
other |
Cloud Security Posture Management (CSPM) Alert | A CSPM tool alerting on a security group rule that allows public access to a database. | CSPM tools like Wiz, Orca, Palo Alto Prisma Cloud |
Cloud Storage Access Policy Analysis (D3-CSAPA).0.0.0.0/0) to a database.This broadly covers securing cloud configurations, such as ensuring network access control lists (ACLs) and security groups are not overly permissive.
Mapped D3FEND Techniques:
Continuously auditing cloud configurations for security weaknesses is essential. This is the core function of CSPM tools.
Mapped D3FEND Techniques:
Encrypting data at rest is a fundamental best practice, though it would not have prevented this specific breach where the service itself was exposed.
Mapped D3FEND Techniques:
To prevent breaches like the one at VoltPay, organizations must implement a Cloud Security Posture Management (CSPM) tool. These tools continuously scan an organization's cloud environment against security best practices and compliance frameworks. For this specific incident, a CSPM tool would have immediately generated a high-severity alert for an Elasticsearch database having a public IP address and a security group allowing inbound traffic from 0.0.0.0/0 on port 9200. This automated, continuous monitoring is essential because cloud environments are dynamic and 'configuration drift' can easily occur. Relying on manual checks or periodic audits is insufficient. A CSPM provides the necessary visibility and automated detection to find and fix critical misconfigurations before they are discovered and exploited by attackers.
Shift security left by embedding it into the development lifecycle. The 'human error' at VoltPay likely occurred during a manual change or a poorly managed migration. By defining all cloud infrastructure using Infrastructure as Code (IaC) tools like Terraform or CloudFormation, configurations become version-controlled, auditable, and repeatable. Furthermore, organizations must integrate IaC scanning tools into their CI/CD pipelines. These scanners can analyze the code for misconfigurations (e.g., public S3 buckets, overly permissive firewall rules) before it is deployed to production. This proactive approach prevents misconfigurations from ever reaching the live environment, transforming cloud security from a reactive, cleanup exercise into a proactive, preventative discipline.
Gain an 'outside-in' view of your organization's digital footprint by using an External Attack Surface Management (EASM) platform. These tools continuously scan the internet from an attacker's perspective to discover all of an organization's internet-facing assets, including forgotten servers, shadow IT, and open ports. An EASM tool would have discovered VoltPay's publicly exposed Elasticsearch database on port 9200 and flagged it as a critical risk. This is crucial for large or fast-moving organizations where asset inventory can be incomplete. EASM provides a necessary reality check against internal documentation and can uncover risks that internal-only scanning tools might miss, such as a database accidentally provisioned in the wrong public subnet.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats