Threat Intelligence Firm Exposes Gigantic Credentials Trove in Open AWS Bucket: The Sweet, Sweet Irony Will Make You Puke

Threat Intelligence Firm Exposes Gigantic Credentials Trove in Open AWS Bucket: The Sweet, Sweet Irony Will Make You Puke


For fuck’s sake, pour me another coffee. This is the one. The story that perfectly encapsulates this godforsaken industry’s relentless, breathtaking capacity for self-parody. A threat intelligence firm—a company whose entire raison d’être is to find and analyze digital threats for other companies—has just left a massive, unsecured AWS S3 bucket open to the public, exposing a colossal trove of credentials and sensitive data. According to the folks at BleepingComputer who broke this beautiful mess, the bucket belonged to a firm called “Thread Intelligence,” also operating as “Osint Industries.”

Let that sink in. A company selling “attack surface management” and “threat intelligence” couldn’t manage its own fucking attack surface. The sheer, unadulterated irony is so potent it could power a small city. It’s like a fire safety inspector storing his manuals in a kerosene-soaked shed. The bucket, discovered by the security researcher Anurag Sen, wasn’t just slightly ajar. It was flung wide open, containing over 1,600 folders and more than 38,000 files totaling about 400GB of data.

What was in this treasure chest of incompetence? Oh, just the usual apocalypse fodder: billions of datapoints from historical data leaks (credentials, emails, passwords), fresh credentials scraped from malware-infected computers, internal company documents detailing their intelligence-gathering processes, and—this is the chef’s kiss—screenshots of customer dashboards and data. So not only did they expose the raw materials of their business, they potentially exposed their clients’ specific threat data too. It’s a full-service breach, courtesy of your trusted intelligence partner.

This isn’t a minor oopsie. This is a catastrophic failure of operational security that completely undermines the very product they sell. Why would anyone pay a firm for threat intelligence when that firm’s own infrastructure is a bigger threat? It’s like hiring a bodyguard who leaves his gun, your home address, and his daily patrol schedule on a park bench. The data exposed is a cybercriminal’s goldmine: a consolidated, searchable database of credentials that can be used for credential stuffing, targeted phishing, corporate espionage, and god knows what else.

Now, before you start pointing and laughing at these specific “ass-clowns” (which, to be clear, they deserve), let’s zoom the hell out. This is not an isolated incident. It’s a symptom of a terminal disease in our industry: the commoditization of complexity and the neglect of fundamentals. Companies are sprinting to sell “AI-powered,” “cutting-edge” threat intel platforms while their basic cloud storage permissions are configured by an intern who got a “How to AWS” video from YouTube. They’re chasing the shiny object—the machine learning model that predicts nation-state attacks—while leaving the fucking database door wide open. It’s security theater at its most expensive and dangerous.

I’ve seen this movie before, and I know exactly how it plays out. The root cause here is almost certainly a toxic blend of arrogance, process failure, and skill atrophy. Some team at Thread Intelligence probably set up that S3 bucket for a specific data processing job. They needed it to be accessible from some script or tool. Instead of using IAM roles or pre-signed URLs—you know, the correct way—they just set the bucket to public-read. Because it was faster. Because “it’s just for a little while.” Because “no one will find it.” And then they forgot about it. No one checked. No automated scanner flagged it. No “attack surface management” tool they likely sell to others was turned on their own assets. The arrogance is believing “we’re the hunters, not the prey.” The process failure is having no governance, no inventory, and no periodic review of cloud assets. The skill atrophy is not understanding or respecting the profound lethality of a misconfigured cloud service.

As I’ve ranted about before regarding the fundamental laziness of modern risk management, this is what happens when security becomes a checkbox exercise for sales, not an engineering discipline. You build a fancy front-end dashboard that shows “risk scores” to C-levels, but you can’t be bothered to write a simple Terraform policy that denies public S3 buckets by default. This aligns painfully with research I’ve been involved in on resilience frameworks, where the primary point of failure is consistently human oversight and procedural decay, not a lack of advanced tools.

So, what’s the Grumpy Fixer’s take? What do you do about this, besides drinking heavily?

First, assume your third-party vendors are idiots. No, seriously. Assume they have the operational security of a toddler with a live grenade. This goes double for security vendors. Conduct rigorous, technical due diligence. Ask for their SOC 2 Type II? Great. Now ask to see their ASM (Attack Surface Management) report on themselves. If they balk, walk away. Your threat intel provider’s infrastructure should be as locked down as a nuclear submarine. If they can’t manage that, they have no business telling you about threats.

Second, turn the tools on yourself. You’re probably running some kind of external attack surface scanner or cloud security posture management (CSPM) tool. Fantastic. Is it scanning all of your assets? Including those spun up by developers in shadow IT projects? Including old S3 buckets from a proof-of-concept two years ago? As I detailed in a piece on the illusion of perimeter control, your attack surface is fluid and vomited across multiple clouds and services. You need continuous discovery, not quarterly audits. The bucket at Thread Intelligence was likely months or years old. A daily scan would have caught it immediately.

Third, embody “Zero Trust” for your infrastructure, not just your users. The principle of least privilege isn’t just for people. It’s for service accounts, API keys, and cloud storage buckets. An S3 bucket should never, ever be public unless it’s deliberately hosting static website content. And even then, you think twice. Use service control policies (SCPs) in AWS Organizations to explicitly deny the ability to make buckets public at the account level. Make it impossible for your engineers to make this mistake, no matter how rushed or lazy they are. This is engineering-led security, and it’s the only kind that works at scale.

Finally, cultivate a culture of ruthless, humble paranoia. The moment you start believing your own hype, you’re dead. The moment your “threat intelligence” team starts seeing themselves as wizards above the fray, they become the target. Every company is a target. Every asset is a liability. Every line of code, every configuration file, every cloud permission is a potential entry point. The folks at Thread Intelligence apparently forgot that. They thought they were the hunters. Today, they’re the lesson.

The fix isn’t another AI widget. It’s discipline. It’s process. It’s the boring, unsexy work of inventory, hardening, and continuous validation. It’s assuming you’re always wrong and checking again. While the industry chases the next buzzword, the breaches keep happening because of the same old, dumb shit. An open bucket. A default password. A missing patch.

Don’t be the threat intelligence firm that gets owned by its own stupidity. Check your buckets. Now. And for God’s sake, hold your vendors to a higher standard than this circus act.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.