676 million records
Data aggregator Infutor, a part of Verisk, has reportedly been responsible for a massive data exposure of 676,798,866 unique records. The incident is believed to have been caused by a misconfigured Elasticsearch database that was left publicly accessible. The exposed dataset contains a treasure trove of highly sensitive personally identifiable information (PII), including full names, physical addresses, phone numbers, dates of birth, and, critically, Social Security numbers. This breach represents a catastrophic failure of basic cloud security controls and poses an extreme risk of identity theft and fraud for a significant portion of the U.S. population. The scale of the breach has already prompted legal investigation for a potential class-action lawsuit.
The root cause of this data exposure is reported to be a misconfigured Elasticsearch database. Elasticsearch is a powerful search and analytics engine, and when not properly secured, an instance can be left open to the public internet, allowing anyone with knowledge of its IP address to access and download the data within. This is a common but entirely preventable cloud security failure.
The exposed data is from Infutor, a company that provides 'identity resolution' and other data services to businesses for marketing and identity verification. This means the compromised database contained aggregated consumer profiles from numerous sources. The sheer volume and sensitivity of the data—especially the presence of Social Security numbers—make this one of the most severe data exposures in recent years.
The attack vector is straightforward: Unsecured Cloud Storage. This falls under the MITRE ATT&CK technique T1530 - Data from Cloud Storage Object.
This type of incident is not a sophisticated 'hack' but rather a failure of fundamental security hygiene. It highlights the critical importance of robust cloud security posture management (CSPM) and secure configuration practices.
The impact of this breach is devastating and widespread:
Detecting and preventing such exposures requires a focus on cloud configuration:
| Type | Value | Description |
|---|---|---|
| log_source | Cloud Security Posture Management (CSPM) Alerts | Alerts indicating a database (like Elasticsearch) is publicly accessible or has no authentication enabled. |
| network_traffic_pattern | Large egress from database to unknown IPs | Monitoring cloud flow logs for unusually large data transfers from database instances to IP addresses outside of the organization's known ranges. |
| api_endpoint | *:9200 |
Internet-wide scans for open Elasticsearch default port 9200. |
| url_pattern | http://<IP_ADDRESS>:9200/_cat/indices |
A common URL path used to enumerate all indices (databases) in an open Elasticsearch instance. |
Prevention is key for this type of incident:
Implement secure baseline configurations for all cloud services, ensuring databases require authentication and are not publicly exposed.
Deploy databases in private subnets and use strict network access controls to prevent public internet access.
Use Cloud Security Posture Management (CSPM) tools to continuously audit the cloud environment for misconfigurations.
Encrypt sensitive data at rest to add another layer of protection in case of unauthorized access to storage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats