Spotify has issued a rolling password reset to some user accounts following the discovery of an open Elasticsearch database containing user credentials. The 72GB database contained over 380 million records and some Spotify users have been impacted. It is estimated that roughly 300,000 to 350,000 accounts were embroiled in the leak, in which email addresses, Personally Identifiable Information (PII), countries of residence, and login credentials — both usernames and passwords — were available to view. The information was not encrypted. According to researchers, the origins of the database are unknown, but it does not belong to the music streaming service itself. Instead, the third-party that created the database may have collated the records from other sources — such as stolen data dumps or another platform — for later use to hijack user accounts.
An exposed database will often result in sensitive information being used by threat actors for nefarious purposes. Unfortunately, threat actors are believed to have collected information and created this database with over 380 million records. Without awareness in the cloud environment, any unnoticed change or update in policy risks customer data. To minimize the attack surface and prevent hackers from abusing personal data, businesses should invest in a platform with complete visibility into the cloud environment and real-time security posture monitoring to minimize the cloud attack surface and ensure data does not end up in the wrong hands. With the ability to remediate gaps in security in real-time, businesses can operate without fear of putting customer data in jeopardy.