Cloud Misconfiguration at Abu Dhabi Finance Week Exposes Sensitive Passport Data

Related

New “Starkiller” Phishing Kit Poses MFA Bypass Risk to Enterprises

What happened Security researchers have uncovered a new phishing-as-a-service (PhaaS)...

Android Malware PromptSpy Leverages AI for Persistent Attacks

What happened Security researchers at ESET have identified PromptSpy, the...

Crypto Scam Campaign Exploits Malvertising and Social Engineering Across Asia

What happened A sophisticated cryptocurrency scam operation is actively targeting...

Share

What happened

At the December 2025 Abu Dhabi Finance Week (ADFW), scans of more than 700 passports and other identification documents belonging to attendees were found publicly accessible on an unsecured cloud storage server. The exposure was discovered by a security researcher and reported by the Financial Times; the server was secured shortly after the issue was flagged.

Who is affected

The leak included passport and identity details of high-profile figures such as former UK Prime Minister David Cameron, hedge fund billionaire Alan Howard, former White House communications director Anthony Scaramucci, and executives including a co-CEO of Binance and the EU ambassador to the UAE, among others whose records were among the roughly 700 exposed. Tens of thousands of broader event participants were not reported as affected. 

Why CISOs should care

This incident underscores persistent risks in cloud security and third-party vendor management—even for large, well-resourced events. Misconfiguration of cloud storage remains a leading cause of sensitive data exposure, with long-term consequences such as identity theft, fraud, and reputational damage for both individuals and hosting organizations. CISOs must treat event technology vendors and cloud-based systems as critical parts of the attack surface, enforce robust access controls, and ensure continuous monitoring to prevent similar lapses.

3 practical actions

  1. Audit cloud configurations regularly: Implement automated tools and scheduled checks to detect publicly accessible resources and misconfigured storage permissions before they are exploited.
  2. Strengthen third-party risk management: Include rigorous security requirements, access controls, and monitoring obligations in contracts with vendors handling sensitive data.
  3. Enhance incident detection and response: Ensure logging, alerting, and rapid response processes are in place so that unusual access patterns are identified and remediated immediately.