Researchers uncover leaked API keys on nearly 10,000 websites

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

A team led by Nurullah Demir at Stanford University in California scanned 10 million web pages and found 1,748 verified, active API credentials from services such as Amazon Web Services, Stripe, GitHub, and OpenAI. These were scattered across nearly 10,000 websites, with affected organizations including a global systematically important financial institution, a firmware developer, and a major hosting platform, alongside banks and healthcare providers. The exposed credentials, such as those potentially revealing RSA private keys, could allow attackers to impersonate servers, decrypt communications, or seize administrative control of company infrastructure. 84% of the leaks appeared in JavaScript environments, likely due to bundler tools used by developers, while 16% came from third-party resources like plugins. The credentials had been publicly accessible for an average of 12 months, with some online for up to five years. Researchers notified the affected companies, and about 50% removed the keys within two weeks, though some did not respond. Katie Paxton-Fear at Manchester Metropolitan University noted that many developers did not intend to be insecure, attributing exposures to programming quirks in development pipelines. Nick Nikiforakis at Stony Brook University highlighted that leaked API keys enable attackers to act as authorized users, posing risks in modern software development. Demir emphasized shared responsibility: developers must configure environments properly, tool creators should hide keys by default, and hosts should scan and deactivate leaks promptly. The findings are detailed in a paper on arXiv (DOI: 10.48550/arXiv.2603.12498).

Relaterede artikler

Illustration of a developer's desk with a computer screen showing malicious npm packages stealing credentials across platforms, highlighting cybersecurity risks.
Billede genereret af AI

Malicious npm packages steal developer credentials on multiple platforms

Rapporteret af AI Billede genereret af AI

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

A massive data breach has come to light, involving 149 million credentials left exposed online. The 98GB cache includes unique usernames and passwords from financial services, social media, and dating apps. The discovery highlights ongoing vulnerabilities in digital security.

Rapporteret af AI

A significant data breach has compromised the credit card information of more than 5.6 million individuals. The incident involves 700Credit, where data was stolen via a third-party API integration. Details emerged in a recent report on cybersecurity threats.

Adult entertainment website Frivol has disclosed a data leak that may impact around 479,000 users. The breach involved an open database containing user details. The revelation was reported on February 25, 2026.

Rapporteret af AI

Criminals have distributed fake AI extensions in the Google Chrome Web Store to target more than 300,000 users. These tools aim to steal emails, personal data, and other information. The issue highlights ongoing efforts to push surveillance software through legitimate channels.

A security vulnerability in the WordPress plugin Ally has been identified as an SQL injection flaw. This issue could potentially affect up to 250,000 websites using the plugin. The flaw was reported in a TechRadar article published on March 12, 2026.

Rapporteret af AI

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

 

 

 

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis