Orvis.com Exposed Hundreds of Internal Passwords on Pastebin.com

  • Orvis.com exposed credentials on Pastebin, as one of their collaborators posted them twice there.
  • The company officially responded that the credentials have already expired, but the discovering firm thinks otherwise.
  • The passwords concerned encryption certificates, routers, servers, and even a safe’s lock combination.

According to a report by Krebs on Security, Orvis.com has leaked a large number of passwords that were used internally by posting them on Pastebin.com by mistake. The credentials concern backend management, firewall administration, router settings, and even provided access to database servers. Orvis.com is an online retailer of clothes, fishing gear, and hunting equipment, and its high quality and "classic" product styling have won them a reputable position in the market. The company operates 69 retail stores and 28 outlets in the U.S. and the UK, while they employ 1700 people.

The first to discover the blunder was a security research firm called “Hold Security”, which tipped Krebs a couple of weeks ago. The researcher then contacted Orvis, and they responded immediately by acknowledging their mistake and removing the Pastebin. As they told Krebs then, the paste had only been exposed for a day and contained old credentials that were already expired. As the Orvis spokesperson stated, most of the devices associated with the leaked credentials have already been decommissioned. Upon hearing this, Hold Security representatives expressed their disagreement.

As the Winsconsin firm publicly states, Orvis apparently posted two lists on Pastebin. The first one was on October 4, and the second was on October 22, so the exposure lasted for more than a single day. As for the content, the usernames and passwords were in plaintext form and constituted the keys to access the following:

-Antivirus engines
-Data backup services
-Multiple firewall products
-Linux servers
-Cisco routers
-Netflow data
-Call recording services
-DNS controls
-Orvis wireless networks (public and private)
-Employee wireless phone services
-Oracle database servers
-Microsoft 365 services
-Microsoft Active Directory accounts and passwords
-Battery backup systems
-Security cameras
-Encryption certificates
-Mobile payment services
-Door and Alarm Codes
-FTP credentials
-Apple ID credentials
-Door controllers
-Combination to a locked safe in the server room

Possibly, the exposure came from one of Orvis’ partners, as the document was notated by “VT Technical Services”. This is a topic for Orvis’ internal investigation, and what matters for us is the fact that a big company has left the keys to their systems online for anyone to grab. Malicious actors are monitoring repositories like Pastebin and GitHub 24/7, so this leak was definitely noticed. It is rare to see exposures without the inclusion of customer data, but with all that was provided this time, actors could have compromised the systems of Orvis to steal anything else they might be interested in.

Have something to comment on the above? Let us know of your thoughts in the comments down below, or on our socials, on Facebook and Twitter.

How to Watch Rosie Molloy Gives Up Everything Online From Anywhere
Rosie Molloy Gives Up Everything is a new comedy show about a recovering addict who tries to start fresh in life. If...
How to Watch I’m An Alcoholic – Inside Recovery Online From Anywhere For FREE
I’m An Alcoholic – Inside Recovery is a documentary that gives viewers a close-up view of an Alcoholics Anonymous meeting in the...
How to Watch Love Island Australia Season 4 (2022) Online From Anywhere
One of the hottest reality TV shows is returning with a brand new season, and we're excited to watch all the episodes...
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: Chrome, Edge, Firefox, Safari