{"id":16958,"date":"2020-06-29T15:09:07","date_gmt":"2020-06-29T11:09:07","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/unusual-ways-to-leak-info\/16958\/"},"modified":"2020-06-29T15:09:56","modified_gmt":"2020-06-29T11:09:56","slug":"unusual-ways-to-leak-info","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/unusual-ways-to-leak-info\/16958\/","title":{"rendered":"4 ways to royally leak your company data"},"content":{"rendered":"<p>If you post pics of concert tickets on Instagram without hiding the barcode, someone could get to <a href=\"https:\/\/www.kaspersky.com\/blog\/never-post-barcodes-online\/12842\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">see your favorite band instead of you<\/a>. The same can happen even if you do <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-leak-image-info\/34875\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">hide the barcode, but with the wrong tool.<\/a><\/p>\n<p>That said, remembering to conceal the barcode properly before bragging about tickets isn\u2019t so difficult. It\u2019s a totally different matter when you post a photo online without noticing a ticket or, say, a sticky note with passwords accidentally in frame. Here are several cases when people published confidential data online without realizing it.<\/p>\n<h2>1. Posting photos against a password backdrop<\/h2>\n<p>Photos and videos taken in offices and other facilities reveal passwords and secrets way more often than you might think. When taking snapshots of colleagues, few people pay attention to the background, the result can be embarrassing \u2014 or even dangerous.<\/p>\n<h3>Military (lack of) intelligence<\/h3>\n<p>In 2012, the British Royal Air Force <a href=\"https:\/\/nakedsecurity.sophos.com\/2012\/11\/21\/prince-william-photos-password\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">put its foot in it<\/a>, big time. Along with a photo report about Prince William, who was then serving in an RAF unit, login details for MilFLIP (military flight information publications) were made public. A username and password on a piece of paper adorned the wall behind the Duke of Cambridge.<\/p>\n<p>Soon after their publication on the royal family\u2019s official website, the images were replaced with retouched versions, and the burned credentials were changed. Whether they were pinned on the wall again is unknown.<\/p>\n<div id=\"attachment_36052\" style=\"width: 508px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150919\/unusual-ways-to-leak-info-pic-1.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-36052\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150919\/unusual-ways-to-leak-info-pic-1.png\" alt=\"MilFLIP login credentials as interior decoration.\" width=\"498\" height=\"487\" class=\"size-full wp-image-16959\"><\/a><p id=\"caption-attachment-36052\" class=\"wp-caption-text\">MilFLIP login credentials as interior decoration. <a href=\"https:\/\/nakedsecurity.sophos.com\/2012\/11\/21\/prince-william-photos-password\/\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>The Prince William incident is hardly unique. Lesser-known military personnel also share secrets online, both with and without the help of the press. For example, one officer <a href=\"http:\/\/parliamentstreet.org\/press-room\/2014\/parliament-street-daily-telegraph-2\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">published a selfie on a social network<\/a> against a backdrop of working displays showing secret information. The serviceman got off lightly with \u201cre-education and training.\u201d<\/p>\n<h3>On-air leak<\/h3>\n<p>In 2015, French television company TV5Monde fell victim to a cyberattack. Unidentified individuals <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/04\/french-tv-network-blames-an-islamist-group-for-11-station-blackout\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">hacked and defaced the organization\u2019s website and Facebook page<\/a>, and they interrupted broadcasting for several hours.<\/p>\n<p>Subsequent events turned the story into a farce. A TV5Monde employee gave reporters an interview about the attack \u2014 against a <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/04\/hacked-french-network-exposed-its-own-passwords-during-tv-interview\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">backdrop of passwords<\/a> for the company\u2019s social media profiles. In the images, the text is hard to read, but enthusiasts were able to get the password for TV5Monde\u2019s YouTube account.<\/p>\n<p>Coincidentally, it was also a lesson in how not to create a password: The secret phrase in question turned out to be \u201clemotdepassedeyoutube,\u201d which, translated from French, is literally \u201cyoutubepassword.\u201d Fortunately, the company\u2019s YouTube and other accounts emerged unscathed. However, the password backdrop story provides some food for thought regarding the initial cyberattack.<\/p>\n<div id=\"attachment_36053\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150929\/unusual-ways-to-leak-info-pic-2.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-36053\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150929\/unusual-ways-to-leak-info-pic-2.png\" alt=\"TV5Monde employee gives an interview against a backdrop of passwords.\" width=\"640\" height=\"362\" class=\"size-full wp-image-16961\"><\/a><p id=\"caption-attachment-36053\" class=\"wp-caption-text\">TV5Monde employee gives an interview against a backdrop of passwords. <a href=\"https:\/\/arstechnica.com\/information-technology\/2015\/04\/hacked-french-network-exposed-its-own-passwords-during-tv-interview\/\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>A similar incident occurred just before Super Bowl XLVIII, in 2014, when the <a href=\"https:\/\/www.zdnet.com\/article\/super-bowl-wi-fi-password-credentials-broadcast-in-pre-game-security-gaffe\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">stadium\u2019s internal Wi-Fi login credentials<\/a> snuck into the lens of a TV cameraman. To add irony to injury, the footage came from the command center responsible for event security.<\/p>\n<div id=\"attachment_36054\" style=\"width: 780px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150938\/unusual-ways-to-leak-info-pic-3.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-36054\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150938\/unusual-ways-to-leak-info-pic-3.png\" alt=\"Wi-Fi login credentials displayed on a screen in the stadium command center.\" width=\"770\" height=\"575\" class=\"size-full wp-image-16963\"><\/a><p id=\"caption-attachment-36054\" class=\"wp-caption-text\">Wi-Fi login credentials displayed on a screen in the stadium command center. <a href=\"https:\/\/twitter.com\/TheSmarmyBum\/status\/430055727777214464\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<h2>2. Using fitness trackers<\/h2>\n<p>Devices that you use to monitor your health might very well enable someone else to <a href=\"https:\/\/www.kaspersky.com\/blog\/fitness-trackers-privacy\/6480\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">monitor <em>you<\/em><\/a>, and even <a href=\"https:\/\/www.kaspersky.com\/blog\/smart-watch-research\/22536\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">extract confidential data<\/a> such as a credit card PIN code from your hand movements. True, the latter scenario is a bit unrealistic.<\/p>\n<p>But data leaks about the location of secret facilities are, unfortunately, perfectly true-to-life. For example, the Strava fitness app, with a user base of more than 10 million, marks users\u2019 jogging routes on a <a href=\"https:\/\/www.strava.com\/heatmap\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">public map<\/a>. It has also lit up <a href=\"https:\/\/www.bbc.com\/news\/technology-42853072\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">military bases<\/a>.<\/p>\n<p>Although the app can be configured to hide routes from prying eyes, not all users in uniform, it seems, are versed in such technicalities.<\/p>\n<div id=\"attachment_36055\" style=\"width: 1336px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150951\/unusual-ways-to-leak-info-pic-4-EN.png\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-36055\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2020\/06\/29150951\/unusual-ways-to-leak-info-pic-4-EN.png\" alt=\"Soldiers' movements at a US military base in Afghanistan shown by Strava heat map. \" width=\"1326\" height=\"709\" class=\"size-full wp-image-16965\"><\/a><p id=\"caption-attachment-36055\" class=\"wp-caption-text\">Soldiers\u2019 movements at a US military base in Afghanistan shown by Strava heat map. <a href=\"https:\/\/www.strava.com\/heatmap#12.19\/69.26844\/34.94082\/hot\/all\" target=\"_blank\" rel=\"noopener nofollow\">Source<\/a><\/p><\/div>\n<p>Citing the threat of new leaks, in 2018 the Pentagon simply <a href=\"https:\/\/www.militarytimes.com\/news\/your-military\/2018\/08\/06\/devices-and-apps-that-rely-on-geolocation-restricted-for-deployed-troops\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">banned deployed US soldiers<\/a> from using fitness trackers. Sure, for those who don\u2019t happen to spend their days at US military bases, this solution may be overkill. But all the same, we recommend taking the time to configure the privacy settings in your fitness app.<\/p>\n<h2>3. Broadcasting metadata<\/h2>\n<p>It\u2019s very easy to forget (or not know in the first place) that secrets can sometimes be hidden in information about files, or <a href=\"https:\/\/www.kaspersky.com\/blog\/office-documents-metadata\/14215\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">metadata<\/a>. In particular, photographs often contain the <a href=\"https:\/\/www.kaspersky.com\/blog\/exif-privacy\/13356\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">coordinates<\/a> of the place where they were taken.<\/p>\n<p>In 2007, US soldiers (there seems to be a pattern developing here) <a href=\"http:\/\/parliamentstreet.org\/press-room\/2014\/parliament-street-daily-telegraph-2\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">posted online photos of helicopters<\/a> arriving at a base in Iraq. The metadata of the images contained the exact coordinates of the location. According to one version of events, the information was subsequently used in an enemy attack that cost the United States four helicopters.<\/p>\n<h2>4. Oversharing on social media<\/h2>\n<p>You can learn some secrets simply by looking at a person\u2019s friends. For example, if salespeople from a particular region <a href=\"https:\/\/hbr.org\/2012\/12\/how-not-to-unwittingly-reveal.html\" target=\"_blank\" rel=\"noopener nofollow\">suddenly start appearing<\/a> in the friend list of a company manager, competitors may conclude that the organization is searching for new markets, and try to steal a march on it.<\/p>\n<p>In 2011, <em>Computerworld<\/em> journalist Sharon Machlis <a href=\"https:\/\/www.computerworld.com\/article\/2469865\/is-your-sensitive-company-info-being-leaked-on-linkedin-.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">carried out an experiment<\/a> to glean information from LinkedIn. In just 20 minutes of searching the site, she found out the number of moderators of Apple\u2019s online forums, the setup of the company\u2019s HR infrastructure, and more.<\/p>\n<p>As the author admits, she didn\u2019t find anything like a trade secret, but Apple prides itself on taking privacy more seriously than the average company. Meanwhile, from the job duties of an HP vice president, again listed on LinkedIn, <a href=\"https:\/\/www.theregister.co.uk\/2011\/05\/03\/hp_vp_leaks_company_cloud_plans\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">anyone could find out<\/a> what cloud services the company was working on.<\/p>\n<h2>How to avoid inadvertently spilling data<\/h2>\n<p>Employees can unwittingly share a lot about your company. To keep your secrets from becoming public knowledge, set strict rules for publishing information online, and inform all of your colleagues:<\/p>\n<ul>\n<li>When taking photos and videos for posting on social media, make sure that nothing gets into the frame that shouldn\u2019t be there. The same applies when someone photographs or films you or your office. Journalists don\u2019t care, but you might get it in the neck if your passwords whizz around the Internet. Keep shoots to places specially designated for the purpose. If there is no such place, at least check the walls and desks beforehand.<\/li>\n<li>Also be aware of what others can see behind you during video calls and teleconferences, even if you\u2019re talking with colleagues or partners.<\/li>\n<li>Hide sensitive personal and business contacts in social networks. Remember that competitors, scammers, and general ill-wishers can use them against you.<\/li>\n<li>Before posting a file, delete its metadata. On a Windows computer, you can do that in the file properties; for smartphones, there exist special apps. Your readers don\u2019t need to know where a photo was taken, or on whose computer a document was created.<\/li>\n<li>Consider before bragging whether work successes might actually be trade secrets. At a minimum, it\u2019s probably not wise to illuminate your triumphs in minute detail.<\/li>\n<\/ul>\n<p>Employees should clearly understand which information is confidential, and know how to handle it. Our <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">automated security awareness platform<\/a> has a course dedicated to that topic.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n","protected":false},"excerpt":{"rendered":"<p>A few stories about how easy it is to accidentally leak sensitive information into the public domain.<\/p>\n","protected":false},"author":2049,"featured_media":16967,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1225,1917,9],"tags":[1183,2314,187,43,97,98],"class_list":{"0":"post-16958","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-privacy","9":"category-smb","10":"category-tips","11":"tag-leaks","12":"tag-metadata","13":"tag-passwords","14":"tag-privacy","15":"tag-security-2","16":"tag-social-networks"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/unusual-ways-to-leak-info\/16958\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/unusual-ways-to-leak-info\/21489\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/unusual-ways-to-leak-info\/8417\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/unusual-ways-to-leak-info\/22692\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/unusual-ways-to-leak-info\/20787\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/unusual-ways-to-leak-info\/19167\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/unusual-ways-to-leak-info\/23416\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/unusual-ways-to-leak-info\/22121\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/unusual-ways-to-leak-info\/28656\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/unusual-ways-to-leak-info\/8521\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/unusual-ways-to-leak-info\/36049\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/unusual-ways-to-leak-info\/15183\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/unusual-ways-to-leak-info\/15755\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/unusual-ways-to-leak-info\/13637\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/unusual-ways-to-leak-info\/24606\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/unusual-ways-to-leak-info\/11663\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/unusual-ways-to-leak-info\/28755\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/unusual-ways-to-leak-info\/25629\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/unusual-ways-to-leak-info\/22531\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/unusual-ways-to-leak-info\/27772\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/unusual-ways-to-leak-info\/27613\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2049"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=16958"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16958\/revisions"}],"predecessor-version":[{"id":16966,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/16958\/revisions\/16966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16967"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=16958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=16958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=16958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}