• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 

SharePoint zero-day CVE-2025-53770 actively exploited in the wild

 | 

Singapore warns China-linked group UNC3886 targets its critical infrastructure

 | 

U.S. CISA adds Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 54

 | 

Security Affairs newsletter Round 533 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Data Breach
  • New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

New Zealand property management company leaks 30,000 users’ passports, driver’s licenses and other personal data

Pierluigi Paganini July 15, 2020

CyberNews reported the discovery of an unsecured Amazon S3 bucket containing users’ passports, driver’s licenses and other personal data

The original post available here: https://cybernews.com/security/new-zealand-property-management-company-leaks-30000-passports-drivers-licenses/

CyberNews received information from reader Jake Dixon, a security researcher with Vadix Solutions, who discovered an unsecured Amazon Simple Storage Solution (S3) database containing more than 31,000 images of users’ passports, driver’s licenses, evidence of age documents, and more. These files are publicly accessible to anyone who has the URL and appears to be owned by the Wellington, New Zealand company LPM Property Management.

Due to the type of company it is, the unsecured database (which appears to only host image files for the company) also contains pictures of applicants and some property requiring maintenance.

Both Vadix and CyberNews attempted to contact LPM Property Management to secure their database. Unfortunately, the company was unresponsive and we had to go through Amazon Web Services to get the issue fixed. The database is now secured.

What data is in the bucket

This particular bucket seems to host images from LPM’s service. Out of the 31,610 files contained in the database, only 15 files are not images.

The files include:

  • Passports, both expired and active, both from New Zealand and abroad
  • Drivers licenses with ID numbers, donor statuses, addresses, DOBs, and full names
  • Evidence of age documents
  • Applicant pictures
  • Images of damaged property (labeled “maintenance requests”)

The way that LPM works is that they will manage various landlords’ property. The images within the database (usually filed under “applicants”) appear to be either landlords or tenants applying for this service. Although we reached out to LPM for clarification on this issue, we received no response.

Nonetheless, these “applicants” images have various documents as proof of identity, most of which are drivers’ licences and some passports. Some of these passports are from outside New Zealand.

Example of passport:

censored passport

Example of Australian passport:

Example of driver’s license:

censored NZ driver license

Who had access to the bucket?

It is unclear at the moment who had access to the exposed Amazon S3 bucket. It is also unclear for how long the bucket was exposed. 

Due to the fact that it is extremely easy to access these types of files, it is possible that bad actors may have accessed the information in this bucket and may potentially use it for malicious purposes. If you believe your information was contained in LPM’s unsecured database, we recommend you set up identity theft monitoring and be on the lookout for suspicious emails, which could be phishing attempts.

What’s the impact?

Having 30,000 passport and driver’s licenses can be a huge find for many bad actors online. This article puts the value of one passport scan at around $14 on the dark web, while another article puts a driver’s license value at about $20. With those prices, the bucket has a price range of $442,540 – $632,200 (assuming the files are either all passports or all driver’s licenses).

With that information, hackers can commit identity theft, including taking out loans or other services in these victims’ names, or simply use the data as part of targeted phishing campaigns.

In either case, these victims are losing.

Declan Ingram, Deputy Director for CERT NZ, which monitors ongoing threats and actively publishes advisories related to cybersecurity incidents, provided some advice for businesses:

“An unsecured database can be a huge risk to customers’ privacy and security. In addition to the standard security measures, such as long strong passwords and two factor authentication, we recommend that businesses consider segmenting their network, including cloud hosted networks. As part of this, businesses should identify sensitive information on their systems, and ensure that access to that data is limited only to systems or people that need it.

By ensuring that all networks are segmented to control who can access them, businesses reduce the likelihood of unauthorised access to the data in those systems. This protects the business, and its customers, from having sensitive information leaked or stolen.

It can take time to segment a current network. As a starting point it is best for organisations to focus on high risk areas to ensure important information is secure. This includes devices that have sensitive data, or devices that control critical administrative functions.”

Disclosure

We attempted to contact LPM Property Management on June 2, after Vadix attempted to contact them on May 10. However, we did not get any response from the company. For that reason, we contacted Amazon Web Services on June 9. They got in contact with the vendor who seems to have refused to fix the issue.

After we insisted that this type of data should not be made public, Amazon was finally able to secure the database on July 6.

We have not received any comment from LPM Property Management.

About the author: CyberNews Team

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, passports)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

Australian passports data leak Hacking hacking news information security news IT Information Security malware Pierluigi Paganini Security Affairs Security News

you might also like

Pierluigi Paganini July 24, 2025
SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks
Read more
Pierluigi Paganini July 24, 2025
DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

    Security / July 24, 2025

    DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

    Security / July 24, 2025

    Stealth backdoor found in WordPress mu-Plugins folder

    Malware / July 24, 2025

    U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

    Hacking / July 24, 2025

    U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

    Hacking / July 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT