banner Expire 1 February 2024
Ad Ends 13 January 2025
ad End 25 April 2025
banner Expire 25 April 2025
banner Expire 16 November 2024
ad expire at 08 november 2024
What's new
banner Expire 16 November 2024
Ad Ends 20 January 2025
banner Expire 11 November 2024
Adv exp on 11 NOv 2024
banner Expire 15 January 2025
Ad expire at 5 August 2024
banner Expire 20 October 2024
Western union transfer
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Dark_Code_x

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 28, 2020
Messages
6,614
Reaction score
715
Points
212
Awards
2
  • Somebody Likes you
  • First post
More than 4,000 applications using Google Firebase are not properly protected.






More than 4 thousand Android applications that use Google Firebase cloud databases inadvertently disclose confidential information about their users, including email addresses, logins, passwords, phone numbers, full names, chat messages and location data.

Specialist Bob Diachenko from Security Discovery, together with Comparitech, found this out by analyzing more than 515 thousand Android applications.

“4.8% of mobile applications on the Google Play Store that use Firebase to store user data are not properly protected, allowing a potential attacker to gain access to databases containing personal information of users, access tokens and other insecure data without a password or any another authentication, ”explained experts

Firebase is a popular platform for developing mobile applications, offering developers various tools for creating programs, secure data storage, fixed Problems and user interactions through the messaging feature.

According to the researchers, since Firebase is a cross-platform tool, improper configuration can also affect iOS and web applications.

The full contents of the database, covering 4282 applications, includes more than 7 million email addresses, 4.4 million logins, 1 million passwords, 5.3 million phone numbers, 18.3 million full names, 6.8 million chat messages, 6, 2 million GPS data, 156 thousand IP addresses and 560 thousand real addresses.

During the analysis, experts also found 9 thousand applications with write permissions, potentially allowing an attacker to inject malicious data, damage the database and even install malware.

Incorrect Firebase configuration allows attackers to easily find and steal data. By simply adding “.json” to the end of the Firebase URL, an attacker can view and download the contents of vulnerable databases. Although Google removed vulnerable database URLs from search results back in 2021, they are still indexed by other search engines such as Bing.

__________________
 
Ad End 1 February 2024
Top