LIVE — Threat Intelligence Active ZyberWalls.com
Independent Cybersecurity Research
Home / The ADFW Leak: How One Public Cloud Setting Exposed Global VIP Data

The ADFW Leak: How One Public Cloud Setting Exposed Global VIP Data

ZW
ZyberWalls Research Team Independent cybersecurity researchers covering zero-days, CVEs, breach analysis and threat intelligence. All facts verified from primary sources.

Abu Dhabi Finance Week (ADFW) is the "Davos of the Desert." It represents the pinnacle of global wealth. But today, it is the poster child for Third-Party Risk. For over two months, an unprotected cloud storage server associated with the event turned the private credentials of elite delegates into public information.

Infographic showing the ADFW data leak caused by a public Amazon S3 bucket, exposing passport scans, invoices, and VIP identities due to cloud misconfiguration.


1. Technical Breakdown: The "Open S3" Anatomy

This wasn't an APT attack or a zero-day. It was a failure of Cloud Governance. A third-party vendor-managed storage environment (likely an Amazon S3 bucket) was misconfigured with Public-Read permissions.

  • The Exposure: Scans of 700+ passports and government IDs, tens of thousands of invoices, and internal wire transfer details.

  • The Discovery: Security researcher Roni Suchowski used commercial cloud-scanning software to identify the bucket. It responded to unauthenticated GET requests from a standard web browser—no hacking tools required.

  • The Duration: The data sat live from the December 2025 summit until it was finally secured this past Monday.

2. The "VIP" Casualty List

The data leaked is a "Who's Who" of global influence. A leaked passport isn't just a privacy headache; in 2026, it's the Golden Key for AI-driven identity theft.

  • Lord David Cameron (Former UK PM)

  • Anthony Scaramucci (SkyBridge Capital / Former White House)

  • Alan Howard (Billionaire Hedge Fund Manager)

  • Richard Teng (CEO of Binance)

  • Lucie Berger (EU Ambassador to the UAE)


3. MITRE ATT&CK Mapping

TacticTechnique IDZyber Analysis
ReconnaissanceT1595.001Active Scanning: Using automated bots to crawl IP ranges for open buckets.
Initial AccessT1530Data from Cloud Storage: Direct access to S3/Blob objects without authentication.
ExfiltrationT1020Automated Exfiltration: The ability to "dump" the bucket once the URL is known.
ImpactT1491Reputational Damage: High-level loss of trust for ADGM and the UAE's financial hub.

4. Indicators of Compromise (IOCs)

Since this was a misconfiguration, there is no "malware" hash. Instead, look for these Behavioral Signatures in your cloud logs:

  • Suspect API Calls: S3:GetBucketPolicy or S3:ListBucket originating from unknown, non-corporate IP addresses (specifically from hosting providers like DigitalOcean or Linode).

  • User-Agent Anomalies: Requests from Zgrab/0.x, Cloud-Scanner, or headless browsers that don't match your team's standard stack.

  • Bulk GET Requests: A sudden spike in GET requests for .pdf or .jpg files (passport scans) from a single external IP.


5. The "Vibe Extortion" Link

Yesterday we talked about Vibe Extortion. This leak is the ultimate fuel for it. An attacker with David Cameron's actual passport scan can craft an AI-generated lure that is virtually impossible to ignore. They don't need to "guess" your details; they have the receipt.


6. Zyberwalls Signatures: The Defender’s Code

To ensure your org doesn't pull an "ADFW," implement these signatures today:

Signature 01: The "Kill-Switch" Automation

Deploy a "Guard Duty" script. If an S3 bucket permission is changed to Public, the script must auto-revert it to Private within 60 seconds and lock the IAM user who made the change.

Signature 02: Third-Party Sanitization

Mandate Cryptographic Erasure. If a vendor handles VIP scans for an event, the contract must require a Certificate of Destruction within 14 days of the event's end. No data, no risk.

Signature 03: Identity-First Storage

Stop using ACLs. Move to Identity-Based Access Control. If the requester isn't authenticated via your SSO/IdP, the bucket shouldn't even exist to the outside world.


Conclusion: Trillions vs. Toggles

The ADFW leak proves that in 2026, complexity is the enemy. You can have $62 trillion in represented assets, but your security is only as strong as a single "Public" toggle on a vendor's cloud dashboard.

Stay Alert. Stay Private. Stay Human.

— ZyberWalls Research Team

No comments