21 million employee screenshots leaked in bossware breach blunder
员工监控工具Work Composer因安全漏洞暴露超2100万张员工屏幕截图及敏感信息,包括用户名和IP地址。该工具本用于监控员工行为,却因未加密和无密码保护导致数据外泄。尽管其声称采用行业领先安全措施,但内部邮件、聊天记录及API密钥等仍被公开访问。事件凸显企业监控软件在数据保护上的严重缺陷。 2025-4-29 10:28:46 Author: www.bitdefender.com(查看原文) 阅读量:15 收藏

Graham CLULEY

If you thought only your boss was peeking at your work screen, think again.

As Cybernews reports, employee-monitoring tool Work Composer has committed a jaw-dropping blunder, leaving a treasure trove of millions of workplace screenshots openly accessible on the internet with no encryption in place, and no password required.

Over 21 million images of capture employees' screens - along with usernames, IP addresses, and device details, were left sitting on an unsecured Amazon S3 storage bucket.

A tool which was intended to, amongst other things, monitor unusual or suspicious behaviour by over 200,000 workers around the globe has itself leaked secret and sensitive information to anyone who went looking for it.

Work Composer's website claims that it understands that "security is paramount" for its enterprise customers, and that it uses "industry-leading security measures" to ensure the protection and integrity of clients' data.

However, as Cybernews points out, internal emails, internal chats, API keys, confidential business documents, usernames, passwords that "could be exploited to attack businesses worldwide" were left unsecured.

According to Cybernews, it informed Work Composer of its serious security problem - and access to the sensitive information has now been properly secured.

But you can't help but wonder - who might have been able to access the millions of screenshots beforehand?

Work Composer is a form of “bossware” – software designed to track employee activity by recording keystrokes and periodically snapping screenshots of their screens.

Like "stalkerware," I don't believe that anyone who has bossware installed on their computers is keen on the idea.

Bossware is used by companies to gauge staff productivity, and to determine is people are "doing what they should be doing." But in this case, it was the Work Composer bossware that was misbehaving - leaving sensitive captured data wide open for anyone to access.

What started as an attempt by companies to keep their employees productive has turned into a case study in how not to handle sensitive data. It only takes one screenshot showing a password or confidential deal to spark a major breach or assist a corporate espionage attempt.

Many businesses may be tempted to deploy bossware surveillance tools, watching over staff members' shoulders to ensure they are doing their jobs correctly and working productively - especially as more and more people work remotely.

But if the companies developing the bossware fail to practice basic security practices themselves, they risk putting everyone in danger.

It's not even as if this is the first time that a bossware company has been caught out by a security snafu. Earlier this year, for instance, an Amazon S3 web bucket belonging to bossware firm WebWork Tracker was found to have been left unsecured despite containing - yup... you guessed it! - sensitive screenshots from remote workers' computers.

You have to begin to wonder - is bossware going to actually help your business, or could the reality be that you are introducing a real risk into your organisation.


文章来源: https://www.bitdefender.com/en-us/blog/hotforsecurity/21-million-employee-screenshots-leaked-in-bossware-breach-blunder
如有侵权请联系:admin#unsafe.sh