No-BS security research

Why Organizations Are Still Leaking Data via Amazon S3

If you’ve been keeping up with IT security headlines over the past 5 years, you likely remember seeing hundreds or even thousands of headlines that look something like this: “(Insert Company X) leaks (X records) due to misconfigured Amazon S3 bucket”. In most cases, this misconfiguration is public accessibility- and especially for the larger organizations with plenty of IT security and operational resources, one can’t help to ask why these incidents keep happening.

So, What Happened?

One of the latest large-scale incidents occurred on April 1, 2026, where the threat actor “BlackVortex1”, associated with the cybercriminal collective “ShadowByt3s” discovered and systematically accessed a Starbucks-owned Amazon S3 bucket with the name sbux-assets. Later that day, on a dark web forum, BlackVortex1 provided proof of the compromise and claimed that ~10GB of data that “makes Starbucks Starbucks” had been successfully exfiltrated.

Asset ClassificationSpecific Technologies Allegedly Compromised
OT & Physical Hardware Firmware.hex binary files for beverage dispensers, including espresso machines, smoothie machines, and underlying ingredient ratios and pricing logic
Global Management & Supply Chain Logistics PlatformsSource code for the web UI used for hardware management, global inventory portal, operational monitoring utilities, and more
Developer Environments & Source CodeJavaScript application bundles with exposed API endpoints; SCSS styling files, source maps capable of reconstructing compiled code, and backup folders containing credentials
Brand AssetsCorporate logos, partner branding assets, and profile images
Figure 1. Alleged composition of the data sourced from the sbux-assets Amazon S3 bucket.

The latest Starbucks breach demonstrates a few key concepts. Number 1 is that even organizations with essentially infinite resources cannot manage misconfigurations and public resources at scale. Number 2 is that the data breached, even though it’s not PII/PHI (or “sensitive” in the traditional sense), is still absolutely devastating to Starbucks’ organization.

Some Observations

Many organizations think of configuration and public resource control as binary; a resource is publicly accessible, or it isn’t. In the real world, when there can be tens of thousands of buckets over dozens of cloud accounts, some buckets need to be public (like one hosting website assets) while others absolutely cannot be under any circumstances. In this way, getting a notification that a public bucket has been created is often useless; even if that bucket is supposed to be public, what happens when sensitive data is mistakenly added to it? Public resource and misconfiguration management should be exactly that- a designed process by which organizations can continuously evaluate, monitor, and manage those data stores. And, considering that Amazon S3 is only 1 of dozens of services that support public accessibility, the issue continues to compound in complexity.

Leave a comment