ll three incidents are publicly documented. In each case, the compromised asset was outside the inventory, outside monitoring, and reachable from the internet.
01 — Twitch — server misconfiguration exposing internal repositories
October 2021 · 125 GB of data exfiltrated · source code exposed
A server configuration error at Twitch allowed an unauthorised third party to access internal Git repositories. Platform source code, internal security tools, and streamer payout data — 125 GB in total — were exfiltrated and published on 4chan in October 2021. The initial access resulted from a misconfiguration, not a sophisticated attack.
Shadow IT connection. The investigation revealed that the misconfigured servers were reachable from the internet. Continuous mapping of the exposed surface from Twitch's root domains would have identified the accessible servers — exactly what an attacker does during reconnaissance, and what EASM does continuously.
02 — Volkswagen / Cariad — S3 bucket left open for months
2024 · 800,000 records exposed · EV geolocation data
A cloud storage bucket belonging to Cariad, the Volkswagen Group's software entity, remained publicly accessible for several months. It contained geolocation data from 800,000 electric vehicles, including those of political figures and German military officers. The asset was monitored by no one after it was deployed.
Shadow IT connection. At the scale of an international group like Volkswagen, manually tracking every cloud service deployed by every entity is structurally impossible. Continuous monitoring of exposed cloud storage is a core EASM capability. This is precisely the type of asset that IT inventories fail to capture.
03 — Dedalus Biologie — health records of 500,000 patients left on a forgotten FTP server <
2021 · 500,000 patients exposed · CNIL fine of €1.5M · sensitive medical data
During a software migration, Dedalus Biologie transferred personal health data from 500,000 French patients to a temporary, unsecured and unencrypted FTP server. The server was not decommissioned after the migration ended. The data — social security numbers, medical treatments, HIV and pregnancy information — was exposed on the internet for several months before being discovered. The CNIL fined Dedalus €1.5 million in April 2022.
Shadow IT connection. The FTP server did not appear in any security inventory after the migration. Continuous mapping of the exposed surface from Dedalus's root domains would have identified it as a reachable asset — exactly the type of forgotten asset that EASM detects continuously.
What these incidents have in common. In all three cases, the compromised assets were absent from security inventories and accessible from the internet. For Twitch, Volkswagen and Dedalus, continuous external mapping would have identified the unregistered exposed services before an attacker, a researcher or a journalist found them.