MCA Wizard Databreach

MCA Wizard Databreach

A large volume of what is most certainly sensitive and confidential information relating to two financial companies has been found exposed online in the latest case of sysadmin or developer mistake.

425GB of data linked to MCA Wizard app found exposed on unsecured database

A large volume of what is most certainly sensitive and confidential information relating to two financial companies has been found exposed online in the latest case of sysadmin or developer mistake.

The exposure was discovered by security researchers at vpnMentor and made public on Tuesday 17th of March 2020. It’s believed to be linked to MCA Wizard, an iOS and Android app developed by Advantage Capital Funding and Argus Capital Funding.

“This is another unfortunate instance of an AWS bucket left open without any security protocols, leaving extremely sensitive legal and financial documents unprotected online — accessible to anyone worldwide,”

James Carder, chief security officer and vice president of security intelligence company LogRhythm Inc

No kidding. In todays connected world there is no excuse for leaving such a wealth of confidential and potentially damaging information available on the internet unprotected and it raises questions.

  • Who wrote the application?
  • What else did they forget in the security?
  • Was the application ever security tested?
  • Are similar applications leaking information?

Companies must deploy security solutions that provide the breadth and depth of capabilities needed in order to maintain complete visibility and control over data in the cloud

Anurag Kahol, chief technology officer of cloud access security broker firm Bitglass Inc.

Agreed, or you could simply use proper access controls on the storage buckets.

Especially for financial organizations that manage sensitive information and capital, a proactive approach to ensuring data is secure is necessary. Automated cloud security solutions can detect misconfigurations in real-time and trigger instant remediation so that vulnerabilities are identified and fixed within seconds and cloud resources remain secure.

Chris DeRamus, chief technology officer of cybersecurity company DivvyCloud Corp.

I could not agree more. There are many open source tools available, such as S3Scanner ( which can be used to detect open and incorrectly secured cloud storage areas.

So what To do?

Well very simply, check your digital estate. It is sadly not uncommon to find unsecured or incorrectly secured cloud storage areas and although they are hard to find, it isn’t difficult to automate it. So check your storage areas today.

  • Recent Articles
Author Details
Founder & CEO at Hedgehog Security

Peter has been in the Information Security world since 1999 and in IT in general since 1996. His work history contains a unique blended balance between the development of exceptional technical capabilities and business knowledge. Peter is a proud father of twins and enjoys GT endurance racing on the weekends.

We would like to keep you informed about our services. Please tick the options below to receive occasional updates via

  • penetration testing steps
    Peter talks to FindMyUkCasino
  • Malware
    SB Tech Breach

    Last week saw SB Tech Breached by the hacking group Maze. It seems that every week the group are announcing more victims.  GameOn asked our CEO Peter Bassill, to give us some insight into the attack. The GameOn article is here.

  • Privacy
    Howto VPn

    In our “How to securely” series we asked our followers what tools they would like a simple guide on to help them stay secure online. There seemed to be a lot of confusion as to what a VPN is and why you should or should not use one. So we asked Peter to help.

  • WhatsApp
    How To Whatsapp Safely

    WhatsApp is among the fastest-growing instant messengers out there, and almost a social network in its own way. But if you are using it, there are some steps you should take to protect your security and privacy.

  • Morrisons Breach Update

    The UK’s highest court ruled that Morrisons can not be liable for a criminal act of a person seeking to harm their business. On April 1st, 2020, a panel of five justices unanimously ruled that Morrisons was not “vicariously liable”.

  • Remote Working Considerations

    With the current pandemic situation, we all need to be taking remote working considerations. While adjusting the work paradym, it is vital to keep a mind’s eye on the security and safety of the businesses information assets

  • Securing Zoom
    How To: Securing Zoom

    In this guide we are looking at how to go about securing zoom. Since the onset of the global pandemic, we have seen surge in “zoom bombing”. This is where people with malicious intent look for in-progress zoom meetings to join and cause trouble.

  • Software Security
    Dell EMC iDRAC memory corruption Vulnerability

    A critical vulnerabiltiy has been identified in Dell EMC iDRAC7, iDRAC8 and iDRAC9. Some unknown processing is affected by this issue. Manipulation with an unknown input can lead to stack based memory corruption.

  • Hiscox Sues for Failing to Disclose Data Breach

    On March 27th, Hiscox Insurance Company Inc. filed a complaint against law firm Warden Grier for concealing a data breach that occurred back in 2016.

  • Software Security
    Privilege escalation on Nginx Controller up to 3.1.x Controller API

    A critical vulnerability has been identified in Nginx Controller up to 3.1.x (web server,) affecting an unknown code block of the component Controller API.

Share on facebook
Share on google
Share on twitter
Share on linkedin
Share on pinterest
Scroll to Top