EY's 4TB SQL Server Backup Exposed Publicly on Azure

EY data exposure SQL Server backup Azure misconfiguration data breach cloud security attack surface management
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 30, 2025 3 min read

TL;DR

Ernst & Young (EY) accidentally exposed a 4TB SQL Server backup file on Microsoft Azure due to a cloud misconfiguration. Security researchers discovered the publicly accessible data, which contained sensitive information like credentials and tokens. EY remediated the issue promptly, but the incident highlights the ongoing risks of cloud misconfigurations and the necessity of robust attack surface management for all organizations.

EY Data Exposure: 4TB SQL Server Backup Found Publicly Accessible on Azure

Ernst & Young (EY), one of the Big Four accounting firms, inadvertently exposed a 4-terabyte SQL Server backup file on Microsoft Azure. This misconfiguration could have provided attackers with access to sensitive financial records, credentials, and authentication tokens belonging to major corporations. Security researchers from Neo Security discovered the publicly accessible database backup through routine attack surface mapping. The exposure has since been remediated following responsible disclosure protocols.

Discovery and Verification Process

The discovery process began with passive reconnaissance. A Neo Security researcher noticed an unusual HTTP response during routine network traffic analysis. A HEAD request returned metadata indicating a 4-terabyte file accessible from the public internet. The file naming conventions matched SQL Server backup (.BAK) file formats, suggesting a complete database export containing schemas, stored procedures, and potentially sensitive data including API keys, session tokens, user credentials, and authentication tokens.

To verify the file’s authenticity without downloading the entire dataset, researchers examined the file’s header signatures the distinctive “magic bytes” that identify file types. The bytes confirmed an unencrypted SQL Server backup.

Exposed Database shown

Image courtesy of gbhackers.com

The SQL Server BAK file is a complete database backup and contains everything: the schema, all the data, stored procedures, and critically, every secret stored in those tables, including API keys, session tokens, user credentials, cached authentication tokens, and service account passwords.

Responsible Disclosure

Confirming the exposure belonged to EY required meticulous detective work. DNS SOA record lookups ultimately pointed to ey.com, revealing the organization behind the misconfigured Azure storage. Rather than downloading the entire file, which would constitute a felony, the researcher analyzed the first kilobytes to confirm file integrity and format authenticity. Researchers immediately ceased technical investigation and began attempting to contact the security team through LinkedIn and other channels since no formal vulnerability disclosure program was readily available.

EY’s incident response proved exemplary. Security leadership acknowledged the report without defensiveness, initiated rapid triage, and completed full remediation within one week. The firm demonstrated the professionalism and technical competency that should characterize incident response for organizations handling sensitive financial data.

Cloud Misconfigurations

The incident underscores a fundamental vulnerability in modern cloud architecture: the gap between infrastructure complexity and human oversight. Cloud platforms prioritize convenience over security defaults. A single misconfigured Access Control List (ACL) changing permissions from private to public transforms an entire terabyte-scale backup into a publicly accessible goldmine for threat actors.

Exposed Database

Image courtesy of gbhackers.com

Modern cloud platforms make it trivially easy to export and backup your database. A few clicks, select your database, choose a destination bucket, and you're done. The export happens automatically in the background. But here's where it gets dangerous: one wrong click, one typo in a bucket name, and suddenly your private data is sitting in a public bucket. You meant to export to company-internal-backups but accidentally typed company-public-assets. Or you created a new bucket for the export, forgot to set it to private, and the cloud provider defaults to public.

The real danger isn’t sophisticated attackers specifically targeting organizations; it’s the massive distributed scanning infrastructure that never sleeps, continuously sweeping the internet’s entire IPv4 space to identify exposed data buckets within seconds. Previous incidents illustrate the urgency. A fintech company fell victim to ransomware after an engineer temporarily exposed a backup to public access for five minutes. During that narrow window, distributed scanners identified and exfiltrated the entire database.

Organizations cannot defend what they don’t know they own. Attack Surface Management has evolved from an optional security enhancement to an essential infrastructure necessity. Continuous, automated adversarial visibility matching the scanning capabilities threat actors deploy represents the only viable defense against cloud misconfiguration catastrophes. EY’s experience demonstrates that even the most resourced organizations remain vulnerable without relentless oversight of their expanding attack surface.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article
WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk
WhisperPair attack

WhisperPair Vulnerability: Millions of Bluetooth Devices at Risk

Millions of Bluetooth audio devices are at risk from the WhisperPair vulnerability. Learn how attackers can eavesdrop and track your devices, and what you can do to protect yourself. Update your firmware now!

By Jim Gagnard January 20, 2026 3 min read
common.read_full_article
Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026
India tech job market

Tech Hiring Growth: 12-15% Increase in AI and Data Jobs by 2026

India's tech job market is set for a 12-15% surge in 2026, creating 1.25 lakh roles. Discover key sectors and skills in demand. Read more!

By Edward Zhou January 19, 2026 3 min read
common.read_full_article