Massive Security Breach: Years of JSONFormatter and CodeBeautify Leaks Reveal Thousands of Passwords and API Keys

Published:

spot_img

Nov 25, 2025Ravie LakshmananData Exposure / Cloud Security

Recent findings have raised serious concerns about data security practices in various sectors, including government, finance, and healthcare. A research initiative by cybersecurity firm watchTowr Labs revealed that organizations in sensitive industries are increasingly using online tools, such as JSONformatter and CodeBeautify, to paste passwords and sensitive credentials. This practice poses a serious threat to data security.

Scope of the Data Leak

WatchTowr Labs analyzed a collection of over 80,000 files uploaded to these platforms and unearthed a staggering range of sensitive information. Among the data exposed were usernames, passwords, repository authentication keys, cloud environment keys, and even session recordings. This dataset also encompassed Active Directory credentials and database credentials used by various organizations.

Moreover, the research included five years of JSONFormatter data and a year of CodeBeautify data, amounting to over 5GB of structured and annotated JSON content. The breadth of this exposure illustrates how easily sensitive data can become accessible through careless online practices.

Affected Sectors

Organizations impacted by this data leak span numerous critical sectors, including telecommunications, technology, aerospace, and ironically, cybersecurity. The leak has demonstrated that no sector is immune to poor security practices. From governmental agencies to private enterprises, a wide array of organizations is potentially compromised.

Popularity and Risk of Online Formatting Tools

The tools in question are popular for their ease of use, often appearing prominently in search results for queries related to JSON formatting. Security researcher Jake Knott indicated that these platforms attract a diverse user base, including developers and administrators, who may not fully appreciate the risks associated with pasting sensitive information online.

Both JSONformatter and CodeBeautify allow users to save formatted code or data as shareable links, which can inadvertently open the door for unauthorized access. This feature can be especially troubling if sensitive information is inadvertently made public.

Accessibility of Leaked Data

The platforms’ architecture adds to the risk. They provide easily accessible “Recent Links” pages that list all saved links, coupled with predictable URL formats for shareable links. This predictable structure could enable malicious actors to quickly harvest sensitive data with minimal effort.

Examples of compromised data include Jenkins secrets, KYC information from financial institutions, and even AWS credentials linked to a major financial exchange. These instances showcase that critical information is frequently mishandled, leading to potentially devastating breaches.

Rapid Exploitation of Exposed Data

In a particularly alarming demonstration of the risks, watchTowr intentionally uploaded fake AWS access keys to one of the tools and discovered that malicious actors attempted to exploit them within just 48 hours. This indicates that the exposed information is being actively monitored and used for malicious purposes, heightening the urgency for organizations to revise their practices.

Calls for Better Data Security Practices

Jake Knott expressed frustration over the ease with which these incidents occur, noting that the ongoing exploitation of exposed credentials reveals a pressing need for heightened security awareness. The focus should be on preventing sensitive data from being pasted into online tools recklessly.

After these revelations, both JSONformatter and CodeBeautify temporarily disabled their save functionality. They stated they are “working on making it better” and are enhancing measures to prevent future misuse. This swift action suggests a positive step towards ensuring that user data is protected more effectively.

In conclusion, the findings from watchTowr highlight a critical need for organizations to reassess their data handling practices, especially concerning sensitive information. As the reliance on digital tools continues to grow, so does the responsibility to ensure that proper security measures are in place to safeguard against potential breaches.

spot_img

Related articles

Recent articles

Vertiv Accelerates Deployment of Converged Physical Infrastructure for NVIDIA Vera Rubin DSX AI Factories

Vertiv Accelerates Deployment of Converged Physical Infrastructure for NVIDIA Vera Rubin DSX AI Factories Dubai, UAE: Vertiv (NYSE: VRT), a prominent player in critical digital...

Latvian and Ukrainian Authorities Dismantle Vishing Ring, Recovering €2M Stolen from EU Citizens

Latvian and Ukrainian Authorities Dismantle Vishing Ring, Recovering €2M Stolen from EU Citizens A recent operation by Latvian and Ukrainian law enforcement has led to...

Bonnie Butlin Strengthens Global Security Through Collaboration and Resilience

Bonnie Butlin Strengthens Global Security Through Collaboration and Resilience In a landscape where cyber threats, geopolitical tensions, and physical security risks increasingly intersect, the concept...

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief

Iran Strikes Tel Aviv with Cluster Warheads, Escalating Conflict After Assassination of Security Chief In a significant escalation of hostilities, Iran has launched missiles equipped...