Watching the Watcher: How a Security Company Leaked Customer Data

Greg Pollock
Greg Pollock
Published Mar 31, 2025

UpGuard can now report that it has secured an Elasticsearch database containing data from APIsec.ai, a security company that claims to be used by 80% of the Fortune 100. The database contained over three terabytes of data generated through monitoring customers’ APIs for weaknesses, including configuration information for private scanning instances, results of API scans for customers’ endpoints, and personal information for users collected during scanning. Together, the data provides extensive information about the attack surfaces of these enterprises.

Timeline

UpGuard detected the open database on the morning of March 5th, 2025. After analyzing the database and determining its significance, UpGuard notified APIsec via email. The database was secured that day.

Significance

The database contained indices for executing the APIsec test suites against customer APIs and storing the results. The largest index, "fx-testsuite-responses-lob," had over 99 million entries using two terabytes of storage space. Multiple indices included data from the scanning tests, with two factors contributing to the large size of the collections: first, the API test responses could be very verbose, including information for many inputs and outputs against an endpoint; and second, the data collection had results spanning from 2018 to 2025. 

List of indices in exposed database showing index names and storage size

Scan results

The APIsec platform helps companies secure their APIs by running tests for common weaknesses like those identified in the OWASP 10. Performing that activity requires specifying the endpoints, choosing which tests to run, and then regularly rerunning those tests to detect new weaknesses. When exposed, this information poses a risk by providing detailed reconnaissance information to attackers. By enumerating what tests are being performed, this data also allows attackers to look for potential issues not being tested.

System credentials 

The index named “fx-accounts” included only six entries, each specifying a username and credentials for a service. Those included the access keys and secret key for an AWS account and credentials for a Slack account and a GitHub account. The created on and last modified time stamps indicated these were created in 2018. Without testing these credentials, UpGuard has no knowledge of whether they were still active at the time of exposure.

Database entry storing AWS accessKey and secretKey

A larger collection of system data was found in the index "fx-clusters." This collection contained 3772 objects, each containing some configuration data for an APIsec scanning instance. 218 entries contained the same AWS accessKey as the record in fx-accounts. Based on the number of clusters using this accessKey, this AWS account appears to have been used for a substantial number of APIsec's scanners. 

APIsec also offers a self-hosted deployment option so companies have greater control over their data and the option to scan endpoints not accessible over the internet. Those self-hosted scanners are created with identifiers and credentials that allow them to communicate with the APIsec web interface. The data included 1340 unique values for the scanner “name” field and 1903 unique values of "FX_KEY."

Generated script for configuring scanner with FX_IAM and FX_ KEY

Personal and account information

The data set included some personally identifiable contact information. Most of this was data used for the sale and operation of the platform, like customers’ names and email addresses associated with their billing accounts. The account metadata included the companies’ names, their plan type, and if/when SSO or MFA were enabled. Information related to APIsec’s public case study customers provided additional evidence that this collection represented real business data. As with the detailed scan data of endpoints, this information gives attackers useful technical and social recon about many potential targets.

Database entry showing customer name, email, MFA configuration, and other metadata

In one curious case, a nail salon website in the UK appears to have sent its own users’ data as responses to APIsec scans, perhaps as a result of testing for (and discovering) an unauthenticated API. As a result, entries for 224 nail salon technicians were captured, including name, email address, mobile phone number, and a bcrypted password. The password values were identical, suggesting the system set these and did not reflect individual passwords. UpGuard analysts identified natural persons matching the names in the data set working as nail technicians in the UK, supporting the case that this data was for real people.

Database entry with name, mobile phone number, and email address for nail salon technician

Conclusion

As companies build up their capabilities for attack surface monitoring, the importance of third-party vendor security increases as well. Reconnaissance information that attackers would aim to collect but which might require access unavailable to them can become concentrated in security tools, which then become the very risk they aim to mitigate. Even the additional security of running private scanning clusters can be a double-edged sword when data leaks expose the secrets used to configure those instances or reveal which customers don’t have MFA enabled.

UpGuard customer support teamUpGuard customer support teamUpGuard customer support team

Protect your organization

Get in touch or book a free demo.

Related breaches

Learn more about the latest issues in cybersecurity.
Deliver icon

Sign up for our newsletter

Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating