A misconfiguration of a database has caused a San Francisco, California, United States-based video marketing software provider to leak the personal details of its users on Shodan.
A misconfigured database has exposed test and personal data belonging to over 700,000 users of the websites getshow.io (an all-in-one video marketing platform) and animaker.com (a DIY video animation software).
It is worth noting that Getshow.io is owned by Animker.com. The server in question is registered under the domain name getshow.io, which animaker.com manages.
The database, which currently contains 5.3 GB of data, continues to grow with new data being added each day. The data exposed by the misconfiguration includes the personal data of unsuspected customers. This consists of the following information:
- Full names
- Device Type
- Postal Codes
- IP Addresses
- Mobile Numbers
- Email Addresses
- Animaker profile details
However, no passwords were found in the data leak, as exclusively revealed to Hackread.com by cybersecurity researcher Anurag Sen from Clouddefense.ai. Sen said that he identified the server on Shodan while searching for misconfigured cloud databases.
The screenshot from the misconfigured server shows the type of information that is being exposed to the public without a password. This means anyone can access the server and would not need to bypass security authentication to access and download the data.
For your information, Shodan is an OSINT tool and a specialized search engine used by cybersecurity researchers to locate vulnerable Internet of Things (IoT) devices, including servers and misconfigured databases on the internet.
Moreover, a misconfigured database occurs when access controls and security settings are improperly configured or left at default settings. Nevertheless, Animker has been informed about the incident, but there has been no response so far. The company’s CEO, RS Raghavan, has been informed on Twitter.
As misconfigured database exposes sensitive data, this can result in significant financial losses, legal liabilities, and reputational damage for affected individuals and organizations.
When a misconfigured database is exposed to the public, it can be discovered and exploited by cybercriminals who use automated tools to scan the internet for open databases. Once they find a vulnerable database, they can use it to steal data, install malware, hijack it for ransom, or launch other types of cyber attacks.
The consequences of a misconfigured database can be severe, as evidenced by recent data breaches at RailYatri and U.S. No Fly List. In these cases, millions of users had their personal information stolen, resulting in significant financial and reputational damage to the companies and authorities involved.
To prevent a misconfigured database from being exposed to the public, experts recommend implementing proper access controls and security settings, including strong passwords, encryption, and regular vulnerability assessments.
Organizations should also limit the amount of sensitive data stored in their databases and ensure that it is only accessible to authorized users.
- American online Ed site leaks 22TB of data
- Uganda Security Exchange leaks 32GB of data
- QR code generator My QR Code leaks user data
- India’s truck brokerage firm leaks 140GB of data
- Chinese Adult Site Leaking 14 Million User Details