Researchers uncover leaked API keys on nearly 10,000 websites

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

A team led by Nurullah Demir at Stanford University in California scanned 10 million web pages and found 1,748 verified, active API credentials from services such as Amazon Web Services, Stripe, GitHub, and OpenAI. These were scattered across nearly 10,000 websites, with affected organizations including a global systematically important financial institution, a firmware developer, and a major hosting platform, alongside banks and healthcare providers. The exposed credentials, such as those potentially revealing RSA private keys, could allow attackers to impersonate servers, decrypt communications, or seize administrative control of company infrastructure. 84% of the leaks appeared in JavaScript environments, likely due to bundler tools used by developers, while 16% came from third-party resources like plugins. The credentials had been publicly accessible for an average of 12 months, with some online for up to five years. Researchers notified the affected companies, and about 50% removed the keys within two weeks, though some did not respond. Katie Paxton-Fear at Manchester Metropolitan University noted that many developers did not intend to be insecure, attributing exposures to programming quirks in development pipelines. Nick Nikiforakis at Stony Brook University highlighted that leaked API keys enable attackers to act as authorized users, posing risks in modern software development. Demir emphasized shared responsibility: developers must configure environments properly, tool creators should hide keys by default, and hosts should scan and deactivate leaks promptly. The findings are detailed in a paper on arXiv (DOI: 10.48550/arXiv.2603.12498).

Relaterede artikler

Dramatic illustration of a darknet leak of Swedish government IT data by hackers, showing computer screens with source code, passwords, and personal files.
Billede genereret af AI

Svensk regerings IT-data lækket på darknet

Rapporteret af AI Billede genereret af AI

En hackergruppe kaldet ByteToBreach har lækket følsomme oplysninger fra et regerings-IT-system på darknet. Lækagen inkluderer kildekode, adgangskoder og persondata fra en platform administreret af IT-konsulenten CGI Sweden. Myndigheder som Cert-SE bekræfter, at de kender til rapporterne, men nægter at kommentere.

A TechRadar report states that over 29 million secrets were leaked on GitHub in 2025. The article suggests that AI is not helping and may be making the situation worse.

Rapporteret af AI

Security specialists have raised alarms over the vulnerability of online accounts, stating that almost half of all passwords in use today can be broken within minutes.

Anthropics nyeste AI-model, Claude Mythos, er lækket trods en vurdering af, at den var for farlig til offentliggørelse. Finansielle institutioner står nu over for avancerede, AI-drevne angreb, der er i stand til at udnytte ukendte sårbarheder.

Rapporteret af AI

Developers of the popular AI tool OpenClaw released patches for three high-severity vulnerabilities, including one that allowed attackers with basic pairing privileges to silently gain full administrative control. The flaw, tracked as CVE-2026-33579 and rated up to 9.8 out of 10 in severity, has raised alarms among security experts. Thousands of exposed instances may have been compromised unknowingly.

Dette websted bruger cookies

Vi bruger cookies til analyse for at forbedre vores side. Læs vores privatlivspolitik for mere information.
Afvis