Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
AI Analysis
Technical Summary
Research by watchTowr Labs uncovered a significant data exposure involving two widely used online JSON formatting and validation tools, JSONFormatter and CodeBeautify. These tools allow users to paste JSON or code snippets, format them, and optionally save the formatted output as shareable URLs. Over five years of JSONFormatter data and one year of CodeBeautify data, amounting to over 5GB of enriched JSON files, were found publicly accessible due to the tools' save features and predictable URL structures. The dataset contained thousands of sensitive credentials including usernames, passwords, repository authentication keys, Active Directory credentials, database and FTP credentials, cloud environment keys, LDAP configurations, API keys for helpdesk and meeting room systems, SSH session recordings, and personal information. Affected organizations span critical national infrastructure, government, finance, insurance, banking, technology, retail, aerospace, telecommunications, healthcare, education, travel, and cybersecurity sectors. The tools' recent links pages and predictable URL patterns allowed attackers to crawl and scrape these URLs systematically. The research also demonstrated that fake AWS keys uploaded to these tools were tested by malicious actors within 48 hours, confirming active exploitation attempts. The exposure results from poor operational security practices where users paste sensitive secrets into third-party online tools without understanding the risks. In response, both JSONFormatter and CodeBeautify have temporarily disabled the save functionality and are working on improvements. The incident highlights the dangers of using public online tools for handling sensitive data and the need for organizational policies to prevent such risky behavior.
Potential Impact
European organizations, especially those in government, finance, telecommunications, and critical infrastructure sectors, face severe risks from this exposure. Compromised credentials can lead to unauthorized access to sensitive systems, data breaches, financial fraud, disruption of critical services, and erosion of trust. The leak of cloud environment keys and Active Directory credentials can facilitate lateral movement within networks, enabling attackers to escalate privileges and exfiltrate data. The exposure of API keys and SSH session recordings further increases the attack surface, potentially allowing attackers to manipulate operational systems or intercept communications. Given the broad range of sectors affected, the impact extends beyond individual organizations to national security and economic stability. The ease with which attackers can scrape and exploit these leaked credentials exacerbates the threat, making rapid detection and response critical. Additionally, the incident may lead to regulatory scrutiny under GDPR and other data protection laws, resulting in legal and financial consequences for affected entities.
Mitigation Recommendations
1. Immediately identify and rotate all credentials, API keys, and secrets that may have been exposed through these tools. 2. Implement strict organizational policies prohibiting the use of public online formatting or validation tools for handling sensitive credentials or data. 3. Educate developers, administrators, and staff on secure handling of secrets and the risks of pasting sensitive information into third-party websites. 4. Employ secrets management solutions that securely store and manage credentials without exposing them in plaintext. 5. Monitor logs and network traffic for suspicious activities indicative of credential misuse or unauthorized access. 6. Use multi-factor authentication (MFA) extensively to reduce the impact of compromised credentials. 7. Engage in threat intelligence sharing with industry peers and national cybersecurity agencies to stay informed about exploitation attempts. 8. Review and enhance incident response plans to quickly address credential leaks and related security incidents. 9. Encourage vendors of online tools to implement stronger security controls, such as non-predictable URLs, access controls, and data retention policies. 10. Conduct regular audits and penetration testing focused on credential exposure risks.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Belgium, Sweden, Poland, Finland
Years of JSONFormatter and CodeBeautify Leaks Expose Thousands of Passwords and API Keys
Description
New research has found that organizations in various sensitive sectors, including governments, telecoms, and critical infrastructure, are pasting passwords and credentials into online tools like JSONformatter and CodeBeautify that are used to format and validate code. Cybersecurity company watchTowr Labs said it captured a dataset of over 80,000 files on these sites, uncovering thousands of
AI-Powered Analysis
Technical Analysis
Research by watchTowr Labs uncovered a significant data exposure involving two widely used online JSON formatting and validation tools, JSONFormatter and CodeBeautify. These tools allow users to paste JSON or code snippets, format them, and optionally save the formatted output as shareable URLs. Over five years of JSONFormatter data and one year of CodeBeautify data, amounting to over 5GB of enriched JSON files, were found publicly accessible due to the tools' save features and predictable URL structures. The dataset contained thousands of sensitive credentials including usernames, passwords, repository authentication keys, Active Directory credentials, database and FTP credentials, cloud environment keys, LDAP configurations, API keys for helpdesk and meeting room systems, SSH session recordings, and personal information. Affected organizations span critical national infrastructure, government, finance, insurance, banking, technology, retail, aerospace, telecommunications, healthcare, education, travel, and cybersecurity sectors. The tools' recent links pages and predictable URL patterns allowed attackers to crawl and scrape these URLs systematically. The research also demonstrated that fake AWS keys uploaded to these tools were tested by malicious actors within 48 hours, confirming active exploitation attempts. The exposure results from poor operational security practices where users paste sensitive secrets into third-party online tools without understanding the risks. In response, both JSONFormatter and CodeBeautify have temporarily disabled the save functionality and are working on improvements. The incident highlights the dangers of using public online tools for handling sensitive data and the need for organizational policies to prevent such risky behavior.
Potential Impact
European organizations, especially those in government, finance, telecommunications, and critical infrastructure sectors, face severe risks from this exposure. Compromised credentials can lead to unauthorized access to sensitive systems, data breaches, financial fraud, disruption of critical services, and erosion of trust. The leak of cloud environment keys and Active Directory credentials can facilitate lateral movement within networks, enabling attackers to escalate privileges and exfiltrate data. The exposure of API keys and SSH session recordings further increases the attack surface, potentially allowing attackers to manipulate operational systems or intercept communications. Given the broad range of sectors affected, the impact extends beyond individual organizations to national security and economic stability. The ease with which attackers can scrape and exploit these leaked credentials exacerbates the threat, making rapid detection and response critical. Additionally, the incident may lead to regulatory scrutiny under GDPR and other data protection laws, resulting in legal and financial consequences for affected entities.
Mitigation Recommendations
1. Immediately identify and rotate all credentials, API keys, and secrets that may have been exposed through these tools. 2. Implement strict organizational policies prohibiting the use of public online formatting or validation tools for handling sensitive credentials or data. 3. Educate developers, administrators, and staff on secure handling of secrets and the risks of pasting sensitive information into third-party websites. 4. Employ secrets management solutions that securely store and manage credentials without exposing them in plaintext. 5. Monitor logs and network traffic for suspicious activities indicative of credential misuse or unauthorized access. 6. Use multi-factor authentication (MFA) extensively to reduce the impact of compromised credentials. 7. Engage in threat intelligence sharing with industry peers and national cybersecurity agencies to stay informed about exploitation attempts. 8. Review and enhance incident response plans to quickly address credential leaks and related security incidents. 9. Encourage vendors of online tools to implement stronger security controls, such as non-predictable URLs, access controls, and data retention policies. 10. Conduct regular audits and penetration testing focused on credential exposure risks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/11/years-of-jsonformatter-and-codebeautify.html","fetched":true,"fetchedAt":"2025-11-25T17:20:34.503Z","wordCount":1101}
Threat ID: 6925e565174e41d3fb49883b
Added to database: 11/25/2025, 5:20:37 PM
Last enriched: 11/25/2025, 5:20:56 PM
Last updated: 12/4/2025, 3:35:42 PM
Views: 454
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54306: n/a
CriticalCVE-2025-53963: n/a
CriticalCVE-2025-54307: n/a
CriticalCVE-2024-45538: Cross-Site Request Forgery (CSRF) in Synology DiskStation Manager (DSM)
CriticalGlobal Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.