{"id":38774,"date":"2020-12-18T15:32:06","date_gmt":"2020-12-18T15:32:06","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/"},"modified":"2020-12-18T15:32:06","modified_gmt":"2020-12-18T15:32:06","slug":"unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/","title":{"rendered":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#8217;s CRM customers"},"content":{"rendered":"<p><span data-label=\"exclusive\">Exclusive<\/span> A business app developer&#8217;s unsecured Microsoft Azure blob left more than half a million confidential and sensitive documents belonging to its customers freely exposed to the public internet, <i>The Register<\/i> can reveal.<\/p>\n<p>Information contained in the blob included occupational health assessments, insurance claim documents from US firms underwritten by Lloyds of London, and senior barristers&#8217; private opinions about junior colleagues applying for promotion.<\/p>\n<p>No security controls were in place on the Azure blob, meaning it was entirely public-facing, and anyone with the address of the files stored in it could view them without authentication \u2013 so they didn&#8217;t need to log in or pass any kind of security check.<\/p>\n<p>The blob also included FedEx shipment security documentation, internal complaints from foodstuffs firm Huel, an investment management firm, and countless others \u2013 and in at least one example seen by <i>The Register<\/i> a passport scan.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/medical.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/medical.jpg?x=648&amp;y=336&amp;infer_y=1\" alt=\"At least one fire brigade stored prospective recruits' pre-joining fitness test results in the blob. Again, this confidential medical data was there for anyone to see\" title=\"At least one fire brigade stored prospective recruits' pre-joining fitness test results in the blob. Again, this confidential medical data was there for anyone to see\" height=\"336\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">At least one fire brigade stored prospective recruits&#8217; pre-joining fitness test results in the blob. This confidential medical data was there for anyone to see<\/p>\n<\/div>\n<p>The blob was operated by Surrey-based app developer Probase, and appeared to be in the public cloud underpinning one of its CRM products. It contained 587,000 files, ranging from backed-up emails to letters, spreadsheets, screenshots, and more.<\/p>\n<p>Files viewed by us as we tried to figure out which firm owned the blob &#8211; and notify it that it needed locking up &#8211; also contained highly sensitive medical data. Some were about people who had applied for jobs with certain fire brigades \u2013 while others were occupational health assessments carried out by private medical firms.<\/p>\n<p>The blob&#8217;s address was passed to <i>The Register<\/i> by Oliver Hough, an infosec researcher concerned about the lack of security controls on it. He expressed hope that it would be closed off as soon as its owner was identified.<\/p>\n<p>Hough told <i>The Register<\/i>: &#8220;Finding a storage bucket like this where a provider has lumped all of their clients&#8217; files in a single bucket rather than creating separate storage for each client demonstrates how, in 2020, the basics of secure design are still not being followed.&#8221;<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/medical2.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/medical2.jpg?x=648&amp;y=336&amp;infer_y=1\" alt=\"Occupational health assessments completed by doctors were also in the blob with no security controls preventing people from reading them\" title=\"Occupational health assessments completed by doctors were also in the blob with no security controls preventing people from reading them\" height=\"336\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Occupational health assessments completed by doctors were also in the blob with no security controls preventing people from reading them<\/p>\n<\/div>\n<p>In a statement, Probase director Paul Brown told <i>The Register<\/i>: &#8220;We are working closely with the Information Commissioner&#8217;s Office at present and advise we have no further comment at all.&#8221;<\/p>\n<p>Brown would not comment on how long the blob had been left unsecured, though files inside dated back to 2013. We have asked the ICO to comment.<\/p>\n<p>One Probase customer is Huel, the liquidised foodstuffs company, which used a complaints-tracking system that appeared to be fed into the unsecured Probase blob. <i>El Reg<\/i> was able to view emails relating to a customer complaint about too many beans in a batch of Huel&#8217;s dried product \u2013 and the supplier&#8217;s response to Huel&#8217;s concerns.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"9\"><a href=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/huel3.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/huel3.jpg?x=648&amp;y=336&amp;infer_y=1\" alt=\"Huel appears to use a Probase-made application for internal tracking of complaints about its products. This email chain was freely viewable to all\" title=\"Huel appears to use a Probase-made application for internal tracking of complaints about its products. This email chain was freely viewable to all\" height=\"336\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">Huel appears to use a Probase-made application for internal tracking of complaints about its products. Again, this email chain was freely viewable to all<\/p>\n<\/div>\n<p>Another customer was the QC Appointments company that decides which junior barristers are awarded promotion to the senior rank of Queen&#8217;s Counsel. <i>The Register<\/i> was able to freely view comments submitted by the most senior barristers and judges in the land on whether their junior colleagues were suitable for promotion \u2013 or not.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"10\"><a href=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/qc.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/qc.jpg?x=648&amp;y=336&amp;infer_y=1\" alt=\"The QC Appointments panel's supposedly private feedback proformas, as well as internal emails, were published on the blob for anyone to read at their leisure\" title=\"The QC Appointments panel's supposedly private feedback proformas, as well as internal emails, were published on the blob for anyone to read at their leisure\" height=\"336\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">The QC Appointments panel&#8217;s supposedly private feedback proformas, as well as internal emails, were published on the blob for anyone to read at their leisure<\/p>\n<\/div>\n<p>Russell Warman, head of the QC Appointments company, told <i>The Register<\/i>: &#8220;Thank you for drawing this to our attention. We&#8217;re making enquiries as a matter of extreme urgency.&#8221;<\/p>\n<p>We understand that Probase has begun informing its customers of its security failure. The blob has been closed off to public access.<\/p>\n<div class=\"CaptionedImage Center Border\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/insurance.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/12\/18\/insurance.jpg?x=648&amp;y=251&amp;infer_y=1\" alt=\"A number of US insurance companies appeared to be using a CRM product that copied customer letters to the Probase blob\" title=\"A number of US insurance companies appeared to be using a CRM product that copied customer letters to the Probase blob\" height=\"251\" width=\"648\"><\/a><\/p>\n<p class=\"text_center\">A number of US insurance companies appeared to be using a CRM product that copied customer letters to the Probase blob<\/p>\n<\/div>\n<p>Other customers appeared to include both the Halal and Kosher certification bodies, which issue certificates to food suppliers confirming that their goods meet the Islamic and Jewish faiths&#8217; respective religious requirements.<\/p>\n<p>Dave Barnett, head of edge protection at infosec vendor Forcepoint, told <i>The Register<\/i>: &#8220;It is fair to say not all cloud and mobile initiatives have had data privacy front of mind. What these breaches show us is that the balance between privacy and ease of access is not there yet. Whether from accidental or intentional loss, the bottom line is that our medical records describe who we are and that information is of great value to an attacker. If you lose your credit card number you can get another relatively easily, but we each only have one set of very personal medical records and any loss here is permanent.&#8221;<\/p>\n<p>Azure blob security has historically had a lower profile than AWS S3 buckets. With more and more evidence emerging that devs using Azure are relying on security through obscurity rather than proper access controls, it is to be hoped that IT admins start paying closer attention to their essential duties.<\/p>\n<p>Customers trust the companies they deal with to take their security seriously. In turn, those companies trust their IT suppliers to secure their customer data properly, especially if it&#8217;s being stored in the cloud. If you&#8217;ve got an Azure blob or an AWS bucket under your management, double-check your access controls before you knock off for Christmas. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/12\/18\/probase_unsecured_azure_blob\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Medical records, insurance claim docs, promotion process feedback&#8230; you name it, Probase bared it Exclusive\u00a0 A business app developer&#8217;s unsecured Microsoft Azure blob left more than half a million confidential and sensitive documents belonging to its customers freely exposed to the public internet, The Register can reveal.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38775,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#039;s CRM customers 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#039;s CRM customers 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-18T15:32:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#8217;s CRM customers\",\"datePublished\":\"2020-12-18T15:32:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/\"},\"wordCount\":921,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/\",\"name\":\"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm's CRM customers 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg\",\"datePublished\":\"2020-12-18T15:32:06+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg\",\"width\":648,\"height\":336},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#8217;s CRM customers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm's CRM customers 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/","og_locale":"en_US","og_type":"article","og_title":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm's CRM customers 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-12-18T15:32:06+00:00","og_image":[{"width":648,"height":336,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#8217;s CRM customers","datePublished":"2020-12-18T15:32:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/"},"wordCount":921,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/","url":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/","name":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm's CRM customers 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg","datePublished":"2020-12-18T15:32:06+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/12\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers.jpg","width":648,"height":336},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/unsecured-azure-blob-exposed-500000-highly-confidential-docs-from-uk-firms-crm-customers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Unsecured Azure blob exposed 500,000+ highly confidential docs from UK firm&#8217;s CRM customers"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38774"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38774\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38775"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}