InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys
Technology

Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys

November 25, 2025 4 Min Read
Share
Years of JSONFormatter and CodeBeautify leaks expose thousands of passwords and API keys
SHARE

A new study has found that organizations in a variety of sensitive sectors, including government, telecommunications, and critical infrastructure, are pasting passwords and credentials into online tools used to format and validate code, such as JSONformatter and CodeBeautify.

Cybersecurity firm watchTowr Labs announced that it has captured a dataset of more than 80,000 files on these sites, revealing thousands of usernames, passwords, repository authentication keys, Active Directory credentials, database credentials, FTP credentials, cloud environment keys, LDAP configuration information, help desk API keys, conference room API keys, SSH session records, and personal information of all kinds.

This includes 5 years of historical JSONFormatter content and 1 year of historical CodeBeautify content, totaling 5GB worth of enriched and annotated JSON data.

Organizations affected by this breach span the critical national infrastructure, government, finance, insurance, banking, technology, retail, aerospace, telecommunications, healthcare, education, travel, and, ironically, cybersecurity sectors.

“These tools are extremely popular, often appearing near the top of search results for things like ‘JSON beautification’ and ‘best place to paste secrets’ (probably unproven), and are used by a variety of organizations, organizations, developers, and administrators in both enterprise environments and personal projects,” security researcher Jake Knott said in a report shared with Hacker News.

Both tools provide the ability to save a formatted JSON structure or code and turn it into a semi-permanent link that can be shared with others. This makes the data accessible to anyone who can access the URL.

Coincidentally, these sites not only provide a convenient (Recent Links) page that lists all recently saved links, but also follow a predictable URL format for shareable links, making it easy for a malicious attacker to retrieve all URLs using a simple crawler.

  • https://jsonformatter.org/{id-here}
  • https://jsonformatter.org/{formatter-type}/{id-here}
  • https://codebeautify.org/{formatter-type}/{id-here}
See also  From quantum hacks to AI defense - an expert guide to building unbreakable cyber resilience

Examples of compromised information include sensitive information from Jenkins, a cybersecurity firm exposing encrypted credentials in sensitive configuration files, Know Your Customer (KYC) information associated with a bank, AWS credentials for a major financial exchange linked to Splunk, and Active Directory credentials for a bank.

To make matters worse, the company announced that it had discovered a malicious actor who uploaded a fake AWS access key to one of these tools and attempted to exploit it 48 hours after it was stored. This indicates that valuable information published through these sources is being collected and tested by other parties, posing significant risks.

“The main reason is that someone is already exploiting it, which is really, really stupid,” Knott said. “We don’t need more AI-powered agent platforms. There will be fewer important organizations pasting their credentials on random websites.”

Checked by The Hacker News, both JSONFormatter and CodeBeautify have temporarily disabled the save feature, claiming they are “working on improvements” and implementing “enhanced NSFW (Not Safe For Work) content prevention measures.”

watchTowr said the save feature was disabled on these sites, likely in response to the investigation. “We believe this change occurred in September in response to communications from a number of affected organizations that we alerted to,” it added.

Share This Article
Twitter Copy Link
Previous Article Sorry about The Witcher 4, but Warframe's dark fantasy little sister is the RPG I wanted the most, and it's one step closer to release Sorry about The Witcher 4, but Warframe’s dark fantasy little sister is the RPG I wanted the most, and it’s one step closer to release
Next Article Some DACA recipients arrested in Trump's immigration crackdown Some DACA recipients arrested in Trump’s immigration crackdown

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Five new exploited bugs listed in CISA catalog - Oracle and Microsoft also targeted
Technology

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

3 Min Read
Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware
Technology

Confucius hackers hit Pakistan with new Wooperstealer and Anonymous malware

3 Min Read
X warns users with security keys to re-register by November 10 to avoid lockout
Technology

X warns users with security keys to re-register by November 10 to avoid lockout

2 Min Read
Lighthouse Phishing Platform
Technology

Google sues China-based hackers behind $1 billion Lighthouse phishing platform

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?