Data leak
Razer Gaming Peripheral Data Exposure β 100,000 Customers' PII via Elasticsearch
Primary Source βIncident Details
In August 2020, security researcher Volodymyr Diachenko discovered a publicly accessible Elasticsearch cluster belonging to Razer β the US gaming hardware company known for gaming peripherals, laptops, and accessories. The exposed cluster contained personal data for approximately 100,000 Razer customers who had placed online orders. Exposed data included customer names, email addresses, phone numbers, customer internal IDs, order numbers, order details, shipping addresses, and billing addresses. The data did not include payment card information. The exposure was estimated to have been publicly accessible for approximately one month before being discovered. Razer was notified and secured the database. The researcher initially attempted to contact Razer through their support channels (having no direct security contact mechanism) before discovering a way to reach Razer’s security team. Razer subsequently offered to compensate the researcher $1,337 in Razer Gold, which was seen by the security community as an inadequate response to a researcher who had responsibly disclosed a significant breach. Razer later stated the response was a misunderstanding and attempted to provide appropriate recognition. The incident highlighted challenges in responsible disclosure when companies lack clear security contact procedures.
Technical Details
- Initial Attack Vector
- Razer's customer data was inadvertently exposed through a misconfigured Elasticsearch cluster that was publicly accessible without authentication; the misconfiguration was set up by a vendor and the public exposure lasted approximately one month before being discovered
- Vendor / Product
- Razer customer Elasticsearch cluster
- Software Package
Elasticsearch
Timeline
- 2020-08-01 Breach occurred
- 2020-09-09 Publicly disclosed
- 2020-09-09 Customers notified