A security research was scouring the dark and other webs recently and came across a 57GB file that had over 380 million records in it. With a little deducation, he concluded it belonged to Zenlayer, a global network services provider playing in the SD-WAN, CDN, and other network spaces. They have nearly 300 datacenters in six continents.
And their back office was just cracked open:
What’s truly alarming is that this treasure trove of data wasn’t safeguarded by even a basic password. It was out there in the open, accessible to anyone, including those with malicious intent. Essentially, it was a “come and take it, no questions asked” scenario, leaving the door wide open for potential exploitation by threat actors.
Ouch.
The danger with this kind of information is manyfold:
- Further Hacks: The more info an attacker has, the easier it is to leverage more attacks. In this case, the hacker knows customer info, what services they have and where, etc.
- Impersonation: A social engineer can contact these customers and effectively impersonate a Zenlayer employee. “Please verify your bank information”, “your payment didn’t go through, can we process another way,” etc.
- Sale of Personal Info: Easy to monetize millions of people’s info if it contains things like name, address, phone number, date of birth, etc.
Zenlayer commented:
We’re aware of the data exposure, have patched the issue, and are engaged with the researcher who originally discovered the data leak. We’ll provide additional information when the investigation is complete.
Full story on HackRead.

Raindog308 is a longtime LowEndTalk community administrator, technical writer, and self-described techno polymath. With deep roots in the *nix world, he has a passion for systems both modern and vintage, ranging from Unix, Perl, Python, and Golang to shell scripting and mainframe-era operating systems like MVS. He’s equally comfortable with relational database systems, having spent years working with Oracle, PostgreSQL, and MySQL.
As an avid user of LowEndBox providers, Raindog runs an empire of LEBs, from tiny boxes for VPNs, to mid-sized instances for application hosting, and heavyweight servers for data storage and complex databases. He brings both technical rigor and real-world experience to every piece he writes.
Beyond the command line, Raindog is a lover of German Shepherds, high-quality knives, target shooting, theology, tabletop RPGs, and hiking in deep, quiet forests.
His goal with every article is to help users, from beginners to seasoned sysadmins, get more value, performance, and enjoyment out of their infrastructure.
You can find him daily in the forums at LowEndTalk under the handle @raindog308.
Leave a Reply