Researchers uncover leaked API keys on nearly 10,000 websites

Researchers analyzing 10 million web pages have identified 1,748 active API credentials from 14 major providers exposed across nearly 10,000 websites, including those run by banks and healthcare providers. These leaks could enable attackers to access sensitive data or gain control over digital infrastructure. Nurullah Demir of Stanford University described the issue as very significant, affecting even major companies.

A team led by Nurullah Demir at Stanford University in California scanned 10 million web pages and found 1,748 verified, active API credentials from services such as Amazon Web Services, Stripe, GitHub, and OpenAI. These were scattered across nearly 10,000 websites, with affected organizations including a global systematically important financial institution, a firmware developer, and a major hosting platform, alongside banks and healthcare providers. The exposed credentials, such as those potentially revealing RSA private keys, could allow attackers to impersonate servers, decrypt communications, or seize administrative control of company infrastructure. 84% of the leaks appeared in JavaScript environments, likely due to bundler tools used by developers, while 16% came from third-party resources like plugins. The credentials had been publicly accessible for an average of 12 months, with some online for up to five years. Researchers notified the affected companies, and about 50% removed the keys within two weeks, though some did not respond. Katie Paxton-Fear at Manchester Metropolitan University noted that many developers did not intend to be insecure, attributing exposures to programming quirks in development pipelines. Nick Nikiforakis at Stony Brook University highlighted that leaked API keys enable attackers to act as authorized users, posing risks in modern software development. Demir emphasized shared responsibility: developers must configure environments properly, tool creators should hide keys by default, and hosts should scan and deactivate leaks promptly. The findings are detailed in a paper on arXiv (DOI: 10.48550/arXiv.2603.12498).

Makala yanayohusiana

A TechRadar report states that over 29 million secrets were leaked on GitHub in 2025. The article suggests that AI is not helping and may be making the situation worse.

Imeripotiwa na AI

Security specialists have raised alarms over the vulnerability of online accounts, stating that almost half of all passwords in use today can be broken within minutes.

ExpressVPN has discovered 3.7 million items of leaked data from an AI chatbot. The leaked information includes voice and text messages as well as private audio recordings up to four hours long. The finding serves as a reminder of encryption's importance.

Imeripotiwa na AI

Microsoft has alerted users that hackers are targeting password reset processes to breach accounts. The activity is attributed to the group Storm-2949.

Jumatano, 20. Mwezi wa tano 2026, 21:38:37

Google publishes exploit code for unfixed chromium vulnerability

Ijumaa, 8. Mwezi wa tano 2026, 18:37:26

Claude Mythos leak heightens cyber threats for banks

Jumamosi, 4. Mwezi wa nne 2026, 14:25:00

Daniel Stenberg warns of risks in curl project

Ijumaa, 3. Mwezi wa nne 2026, 10:14:58

OpenClaw patches severe vulnerability granting admin access

Alhamisi, 19. Mwezi wa tatu 2026, 04:05:30

Three high-risk AI vulnerabilities discovered in Claude.ai

Jumatano, 11. Mwezi wa tatu 2026, 14:00:34

Google report warns of shifting cloud threat landscape

Jumatano, 25. Mwezi wa pili 2026, 16:14:20

Frivol adult site reports data leak affecting 479,000 users

Jumatatu, 23. Mwezi wa pili 2026, 08:01:15

Malicious npm packages harvest crypto keys and secrets

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa