Data of over 100 mn users exposed via 3rd-party Cloud services

According to Check Point Research (CPR), it recently discovered that in the last few months, many application developers have left their data and millions of users' private information exposed by not following best practices when configuring and integrating third party cloud-services into their applications.

After examining 23 Android applications, mobile app developers potentially exposed personal data of over 100 million users through a variety of misconfigurations of third-party cloud services, a report said on Thursday.

According to Check Point Research (CPR), it recently discovered that in the last few months, many application developers have left their data and millions of users' private information exposed by not following best practices when configuring and integrating third party cloud-services into their applications.

Advertisement

The misconfiguration put users' personal data and developers' internal resources, such as access to update mechanisms, storage and more, at risk, the report said.

Also Read | Strong links between our hormones and Covid-19 confirmed

Advertisement

Personal data includes emails, chat messages, location, passwords and photos, which, in the hands of malicious actors, could lead to fraud, identity theft and service swipes.

According to the report, the researchers found that Astro Guru -- popular astrology, horoscope and palmistry app with over 10 million downloads -- has a misconfiguration.

Advertisement

After users input their personal information such as their name, date of birth, gender, location, email and payment details, Astro Guru provides them a personal astrology and horoscope prediction report, the report said.

Also Read | New antiviral with 99.9% efficacy against Covid-19 developed

Advertisement

This misconfiguration of real-time databases is not new and continues to be widely common, affecting millions of users, the report said.

All CPR researchers had to do was attempt to access the data. There was nothing in place to stop the unauthorised access from happening, it added.

Advertisement

The report said that an effective mobile threat defense solution needs to be able to detect and respond to a variety of different attacks while providing a positive user experience.
 

tags
Advertisement