Another MongoDB Hack Leaks Two Million Recordings Of Kids

Outsmart Malicious Hackers


No surprises here, but there’s been another big MongoDB hack and from the looks of it, it’s been owned for quite some time. This time 2 million records from over 820,000 accounts have been leaked due to yet another default MongoDB installation with no authentication listening on the public IP address.

Another MongoDB Hack Leaks Two Million Recordings Of Kids

The terrible part is, this has been happening for a while, the company has known about it and done nothing to secure it. What I suspect is if they turned auth on, the bears would probably stop working, and they couldn’t do that could they? I imagine they don’t have a firmware push facility built in to the bear.

Two million voice recordings of kids and their families were exposed online and repeatedly held to ransom – because an IoT stuffed-toy maker used an insecure MongoDB installation.

Essentially, the $40 cuddly CloudPets feature builtin microphones and speakers, and connect to the internet via an iOS or Android app on a nearby smartphone or tablet. Families can use the fake animals to exchange voice messages between their children, friends, and relatives.

For example, a parent away on a work trip can open the CloudPets app on their smartphone, record an audio message, and beam it to their kid’s toy via a tablet within Bluetooth range of the gizmo at home; the recording plays when the tyke press a button on the animal’s paw.

Similarly, the youngsters can record messages using the stuffed creature, and send the audio over to their mom, dad, grandparent, and so on, via the internet-connected app.


I suspect this was probably one of the earlier victms of the MongoDB Ransack that was exposed in January, with CloudPets being hit first sometime in December.

And even earlier last year was one of the first big public cases caused by MongoDB – BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records.

These voice clips, along with records of 820,000 CloudPets.com accounts associated with the each of the toys, have been left wide open on the internet, with no password protection – allowing gigabytes of sensitive material to potentially fall into the hands of criminals. And it’s all due to the company’s poorly secured NoSQL database holding 10GB of this internal information.

CloudPets’ internet-facing MongoDB installation, on port 2701 at 45.79.147.159, required no authentication to access, and was repeatedly extorted by miscreants, evidence shows. The database contains links to .WAV files of voice messages hosted in the Amazon AWS S3 cloud, again accessible with no authentication, potentially allowing the mass slurping of more than two million highly personal conversations between families and their little ones.

It appears crooks found the database, presumably by scanning the public ‘net for insecure MongoDB installations, took a copy of all the data, deleted that data on the server, and left a note demanding payment for the safe return of a copy of the database. This happened three times, we’re told. Copies of data lifted from the CloudPets system has been passed between underground hacking groups, too, apparently.

I suspect we’ll see more of these as time goes on, the juicy ones have most likely been kept private for as long as possible to extort maximum value. They will only go public when one of the good guys gets wind of it (with proof). I have some reports of leaks too but I haven’t been able to validate them.

This one is pretty sad though, with kids voice messages being exposed. As a parent I can say I’ll not be allowing any IoT style toys anywhere near my kids, or cloud cameras or anything vaguely similar. If they want to send me a message they can use a Google Hangout or something.

Source: The Register

Posted in: Database Hacking, Exploits/Vulnerabilities

,


Latest Posts:


StaCoAn - Mobile App Static Analysis Tool StaCoAn – Mobile App Static Analysis Tool
StaCoAn is a cross-platform tool which aids developers, bug bounty hunters and ethical hackers performing mobile app static analysis on the code of the application for both native Android and iOS applications.
snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.


Comments are closed.