Four Terabytes of SQL Leaked from Azure client Ernst & Young



 A major data exposure incident involving Microsoft Azure occurred in late October 2025, when Ernst & Young (EY)—one of the Big Four accounting firms—inadvertently left a 4-terabyte SQL Server backup file publicly accessible on Azure Blob Storage. Here's a breakdown of what happened:


Incident Summary

  • What was exposed: A .BAK file containing a full SQL Server database backup.
  • Size: 4 terabytes—equivalent to millions of documents.
  • Contents:
    • Database schemas and stored procedures
    • API keys, session tokens, user credentials
    • Authentication tokens and service account passwords
    • Potentially sensitive financial and audit data. [cybersecur...tynews.com]

How It Happened

  • The exposure was not due to a hack, but a cloud misconfiguration:
    • During a cloud migration, an engineer mistakenly set the backup file to public instead of private.
    • The file was unencrypted, compounding the risk. [sdxcentral.com]
  • Neo Security, a cybersecurity firm, discovered the file during routine asset mapping.
    • They used a HEAD request to retrieve metadata and confirmed the file type using “magic bytes.”
    • Ownership was traced to EY via DNS SOA records and merger documents. [cybersecur...tynews.com]

Response & Remediation

  • EY’s Computer Security Incident Response Team (CSIRT) was contacted via LinkedIn after 15 attempts.
  • EY responded professionally and remediated the issue within a week.
  • EY stated that:

    “No client information, personal data, or confidential EY data has been impacted. The issue was localized to an entity acquired by EY Italy and was unconnected to EY global cloud and technology systems.” [cybersecur...tynews.com]


Security Implications

  • This incident highlights:
    • The risks of cloud misconfiguration, especially with default public access settings.
    • The importance of encryption at rest—had the file been encrypted, the exposure would have been far less severe.
    • The speed of automated botnet scanning, which can detect exposed data in minutes. [cyberpress.org]


Popular posts from this blog

WSUS CVE-2025-59287 Mitigation

Cloud Infrastructures are Having a Bad Week

Best Alternatives to Windows 10