May 2, 2016 By Douglas Bonderud 2 min read

IT professionals need every advantage they can get when it comes to time management. That explains why team messaging service and bot-design tool Slack has become one of the most popular on the market with more than 2.7 million daily active users, according to Tech Times.

As noted SecurityWeek, however, there’s a problem: Some developers have been posting their projects publicly on file sharing services such as GitHub without removing their Slack access tokens. The result? It’s one of the easiest hacks ever for curious — but largely unmotivated — cybercriminals. Here’s the deal.

Slacking Off

One lauded feature of Slack is chatbot integration, which allows developers to create custom bots for a single task. However, security firm Detectify now warned this also presents a significant risk to corporate data.

Slack itself is off the hook — after all, its feature is doing exactly what’s on the box. The problem lies with developers. Many included their Slack access tokens in bot code and then made this code public, in effect giving cybercriminals keys to the corporate kingdom.

All cybercrooks need to do is scan GitHub, grab a token and then use it to gain chat and file access. So far, Detectify has found more than 1,500 tokens — such as xoxp private and xoxb custom bot tokens — from a host of different sources. Forbes 500 companies, payment providers, ad agencies and universities have all made the same mistake.

The Problem With Slack Access Tokens

After learning about the risk, Slack revoked the exposed tokens and said it will now keep an eye out for other access tokens that shouldn’t be part of public bot code. The problem? It may not help. Part of the reason stems from Slack access tokens themselves; while offering full access is easy, creating one with limited permissions is more cumbersome.

History also plays a role. As noted by Ars Technica, companies posting sensitive data on sites like GitHub isn’t a surprise. Last year, Uber stored the access key to a database containing the information of 50,000 drivers on a public page. Criminals regularly scour sharing services for corporate credentials, Web service logins and, now, access tokens.

Bottom line? Lazy and motivated cybercriminals alike would love it if companies would just relax, assume the best and post whatever they want online. After all, it’s far less work to walk through an open door than smash a window. Better still, using legitimate access credentials gives attackers a measure of time to play undetected in corporate networks.

The bot builder is working hard to keep businesses safe from their own poor judgment, but the best Slack can do is damage control. If companies want to stay safe, it’s time to up the effort: Any code moving from private to public needs a credential cleaning before it hits the Web.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today