The digital attack surface is expanding at an unprecedented rate, with millions of new online assets emerging daily, many of them unintentionally exposed. This surge is increasing the risk of data leaks, misconfigured cloud services, and exposed credentials, creating a cybersecurity crisis that organizations often remain unaware of—until an attacker exploits it.
A recent RedHunt Labs report reveals the staggering scale of this exposure:
🔹 Over 19 million new subdomains emerge daily, expanding digital footprints beyond corporate awareness.
🔹 3,490 sensitive credentials leak every day, including AWS keys, API tokens, and database credentials found in public repositories.
🔹 4.8 million+ code commits analyzed daily, exposing security flaws within corporate repositories.
🔹 750,000+ commits linked to corporate email addresses, potentially revealing internal infrastructure.
Despite these alarming figures, most organizations fail to detect their exposure until it’s too late.
Real-Time Monitoring of Internet Threats
The Internet Attack Surface Dashboard, developed by RedHunt Labs, tracks these threats in real time, providing insights into leaked credentials, attack surface shifts, and security trends. This initiative aims to make these risks visible before they escalate into a data breach.
Key findings from the latest research:
📌 5.0 billion unique subdomains collected, with 786 million added in the last 30 days.
📌 7.7 billion code commits analyzed since 2015, with 143 million new commits in the past month.
📌 9.9 million leaked secrets detected since 2023, with 135,280 new credentials exposed in the last month.
📌 11.5 million DockerHub repositories tracked, with 2.6 million new correlations in 30 days.
These numbers highlight the escalating security risks of an ever-growing digital landscape.
Leaked Credentials: A Growing Crisis
One of the most concerning findings is the massive exposure of sensitive credentials across public repositories. Just in the past week, thousands of API keys, access tokens, and other secrets were found in public code, including:
- Telegram Bot API keys (ozforensics.com).
- Postman API keys (postman.com).
- SonarQube access credentials (gmail.com).
- AWS Secret Access Keys (ozforensics.com).
- GitHub Access Tokens (eidson.info).
These leaked credentials can give attackers direct access to cloud servers, databases, and internal systems, making them one of the most critical vulnerabilities organizations face today.
The Risks of Open-Source Development
The rise of open-source development and collaborative coding platforms like GitHub, GitLab, and BitBucket has significantly contributed to the increase in exposed secrets and vulnerabilities.
🔹 7.1 billion GitHub commits analyzed since 2015, with 5.2 million new commits in the last 24 hours.
🔹 665.2 million GitLab commits, with 1.5 million added in the past month.
🔹 413,000 BitBucket commits, with 500 new commits in the last 24 hours.
As more companies rely on open-source development, the risk of unintentionally exposing sensitive data skyrockets.
Cloud Infrastructure at Risk
Another key concern is cloud security, where misconfigured services and leaked credentials are leading to major security breaches.
☁ AWS credentials frequently exposed, giving attackers potential access to cloud environments.
☁ DockerHub repositories analyzed for security issues, revealing vulnerabilities in containerized deployments.
☁ APK files analyzed for misconfigurations, exposing risks in Android application security.
With cloud adoption growing, securing credentials and configurations must be a top priority.
The Urgent Need for a Proactive Cybersecurity Strategy
RedHunt Labs’ research underscores the critical need for continuous security monitoring. The volume of exposed assets and leaked credentials is increasing daily, and many organizations only realize their vulnerabilities after an attack has occurred.
To mitigate these risks, companies should:
✅ Continuously monitor their attack surface using real-time security tools.
✅ Implement strong access controls and secret management policies to protect credentials.
✅ Conduct regular security audits of code repositories to prevent data leaks.
✅ Strengthen cloud security practices to safeguard infrastructure and sensitive data.
In today’s fast-evolving digital landscape, cybersecurity is no longer optional—it’s a necessity. Organizations that fail to stay ahead of these threats risk becoming the next major breach headline.
More information: Research Redhunt Labs