Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Private keys and logins BMW were stored in public Azure server
2 min Security

Private keys and logins BMW were stored in public Azure server

Floris Hulshoff PolFebruary 15, 2024 2:28 pmFebruary 15, 2024
Private keys and logins BMW were stored in public Azure server

A misconfiguration of a Microsoft Azure server at BMW leaked sensitive company information. This was discovered by a SOCRadar researcher during a routine Internet scan, reports TechCrunch.

According to TechCrunch, Can Yoleri, a security researcher at SOCRadar, discovered the misconfigured and thus open Azure server of German automotive group BMW. This happened during a routine scan of the internet. The so-called Azure “bucket” was located in BMW’s development environment and was accidentally configured as a public server instead of a private server. This made the information in the bucket readable.

Login credentials for multiple cloud services

In the open Azure bucket, the security researcher found sensitive information, including access information for Azure containers, secret keys to access private bucket addresses and details about other cloud services. More specifically, this would include private keys for BMW cloud services in China, Europe and the U.S. It also involved login details for the automotive group’s production and development databases.

It is unknown how long the bucket in question was open. The security researcher shared his findings with BMW.

Problem partially addressed

BMW indicated that the Azure bucket in question had indeed been open in response to the event. According to a spokesperson, it involved an Azure bucket in the company’s storage development environment. Customer data or other personal information was not leaked.

By early 2024, BMW would have resolved the issue. The company remains alert to possible misuse. The automaker would not comment on how long the bucket in question had been open and did not say whether malicious access to the exposed data had been gained in the meantime.

Researcher Yoleri stated in a reaction that the automotive group still has not revoked or updated all passwords or other login credentials. Thus, the automotive group has only made the Azure bucket private.

More misconfigurations in the automotive industry

By the way, BMW is not the only German automobile manufacturer that has recently inadvertently disclosed company-sensitive data. In January of this year, Mercedes-Benz accidentally left a private GitHub token open that provided unlimited access to company source code.

Read also: Internal data Mercedes-Benz was accessible due to public GitHub token

Tags:

Azure / BMW / Data leak / login credentials / misconfiguration

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Dutch researcher discovers Fujitsu blunder: AWS keys and logins in public bucket

IBM: Cloud use makes Europe biggest target of hackers in 2023

Hackers sell data center login credentials of large multinationals

Cloud services Microsoft Azure in Texas were temporarily offline due to extreme weather conditions.

Editor picks

Europe’s data center market booms: is it ready to take on the US?

European data center ambitions

Microsoft is mulling an E7 tier for AI agents

Microsoft is reportedly working on a new Microsoft 365 subscription, ...

Microsoft 365 E7 unveiled: biggest licensing change in ten years

Microsoft has confirmed to Techzine that it will be launching the Mic...

“Blind AI deployment leads to knowledge loss and software failures”

Artificial intelligence is rapidly being integrated into business pro...

Techzine.tv

Cisco's 102.4 terabit chip supercharges AI data centers

Cisco's 102.4 terabit chip supercharges AI data centers

Why vulnerability counting fails: a new approach to risk ops

Why vulnerability counting fails: a new approach to risk ops

NetSuite founder reveals AI transformation 5 years in the making

NetSuite founder reveals AI transformation 5 years in the making

How Cisco's AI Canvas is revolutionizing network troubleshooting

How Cisco's AI Canvas is revolutionizing network troubleshooting

Read more on Security

Mass attack by Russian hackers on Dutch military personnel and civil servants

Mass attack by Russian hackers on Dutch military personnel and civil servants

The MIVD and AIVD warn of an active Russian hacking campaign targeting Signal and WhatsApp accounts of Dutch ...

Berry Zwets 1 day ago
Claude can now scan for complex vulnerabilities, but who will find them?
Top story

Claude can now scan for complex vulnerabilities, but who will find them?

Anthropic has launched Claude Code Security, albeit in limited preview mode. The tool enables security teams ...

Erik van Klinken February 23, 2026
Fake installation pages Claude Code spreads infostealer

Fake installation pages Claude Code spreads infostealer

Security researchers at Push Security have discovered a new technique they call InstallFix. Attackers clone i...

Berry Zwets March 6, 2026
Wiz sees big impact of AI on runtime security, but also stresses old threats
Top story

Wiz sees big impact of AI on runtime security, but also stresses old threats

Cloud security has evolved beyond a specialized domain to encompass virtually all aspects of modern cybersecu...

Sander Almekinders March 2, 2026

Expert Talks

When is an SBOM not an SBOM? CISA’s Minimum Elements

When is an SBOM not an SBOM? CISA’s Minimum Elements

In August 2025, CISA (the US Cybersecurity Infrastructure & Infra...

Sovereign: the new normal for AI and cloud native (and how to make it work)

Sovereign: the new normal for AI and cloud native (and how to make it work)

As we head into KubeCon 2026 in Amsterdam, the word we keep hearing i...

A decade of Cloud Native at ING: Lessons learned, and what comes next

ING’s private cloud has been around for over a decade, and its clou...

Advancing Europe’s public agenda through Open Source Software Foundations

Digital products & services shape almost every sector of modern l...

Tech calendar

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

GITEX ASIA 2026

April 9, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

SAS Innovate 2026

April 27, 2026 Grapevine

Team '26

May 5, 2026 Anaheim

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement