Anatomy of a Breach

Anatomy of a Breach: Ecuador — 20.8 Million Citizens Exposed, Including the Dead

> series: anatomy_of_a_breach —— part: 129 —— target: ecuador_population —— records: 20,800,000 —— authentication: none —— includes: deceased_citizens<span class="cursor-blink">_</span>_

Hedgehog Security 30 September 2019 12 min read

20.8 million records. More than the living population. On an unsecured Elasticsearch server.

In September 2019, researchers at vpnMentor discovered an unsecured Elasticsearch database containing the personal records of approximately 20.8 million Ecuadorians — exceeding Ecuador's living population of approximately 17 million because the database also included records of deceased citizens. The database, operated by Ecuadorian data analytics firm Novaestrat, contained 18GB of data including full names, dates of birth, places of birth, home addresses, national ID (cédula) numbers, tax identification numbers, employment information, employer names, job titles, salary details, marital status, family member relationships, and — for some records — financial account information from Banco del Instituto Ecuatoriano de Seguridad Social.

The Elasticsearch server required no authentication whatsoever — anyone who discovered the server's IP address could access the complete dataset. The exposure echoed the MongoDB ransomware wave of 2017 and the Moonpig API (2015): critical databases deployed without any access controls. The Ecuadorian government arrested the Novaestrat executive responsible and introduced emergency data protection legislation.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

An entire nation's data — including the dead — with no password.

Entire Population Exposed
Like the <a href="/blog/anatomy-of-a-breach-philippines-comelec">Philippines COMELEC breach</a> (55M voters, 2016) and the <a href="/blog/anatomy-of-a-breach-opm">US OPM breach</a> (21.5M, 2015), the Ecuador exposure affected an entire national population. When population-scale data is exposed, the consequences extend beyond individual identity theft to national security, economic stability, and social trust.
No Authentication — Again
The Elasticsearch server had no authentication. This is the same class of misconfiguration that enabled the <a href="/blog/anatomy-of-a-breach-mongodb-ransomware">MongoDB attacks</a> (2017) and that our <a href="/penetration-testing/infrastructure">infrastructure testing</a> and <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> check for on every engagement. <a href="/cyber-essentials">Cyber Essentials</a> mandates authentication on all systems.
Third-Party Data Aggregator
Novaestrat was a private analytics firm that had aggregated government data — creating a single point of failure for the entire population's records. The concentration of data in third-party aggregators creates systemic risk. Our <a href="/blog/sector-under-the-microscope-professional-services">supply chain analysis</a> examines third-party data concentration risk.
Records of the Deceased
The database included records of deceased citizens — demonstrating that the data had been compiled from historical government records without any data minimisation or retention controls. Under GDPR, data must be retained only as long as necessary for its purpose. <a href="/cyber-essentials">Cyber Essentials</a> and GDPR compliance both require data minimisation.

Authentication is not optional. Data minimisation is not optional. Ever.

The Ecuador breach demonstrated two fundamental principles: first, every database must require authentication — there is no scenario where an internet-accessible database should accept anonymous connections. Second, data aggregation without security creates population-scale risk. Cyber Essentials mandates authentication on all systems. Our infrastructure testing identifies exposed databases. Cloud configuration reviews assess Elasticsearch, MongoDB, and other database exposure. SOC in a Box monitors for unauthorised database access. And UK Cyber Defence provides incident response when exposed databases are discovered.


Ecuador's entire population exposed through an unsecured database. Are your databases authenticated?

Our <a href="/penetration-testing/infrastructure">infrastructure testing</a> finds exposed databases. <a href="/penetration-testing/cloud-configuration-review">Cloud reviews</a> check Elasticsearch and MongoDB. <a href="/cyber-essentials">Cyber Essentials</a> mandates authentication.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles